Data security

Results: 28926



#Item
971Data management / SQL / NoSQL / Structured storage / SQL injection / Password / Database

NO SQL! NO INJECTION? A talk on the state of NoSQL security IBM Cyber Security Center of Excellence IBM AppScan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-26 10:25:56
972Data management / Data security / Personal /  Inc. / Avatar / Form / Website

2014 IEEE Joint Intelligence and Security Informatics Conference A Service-independent Model for Linking Online User Profile Information Matthew Edwards Awais Rashid Paul Rayson Security Lancaster, School of Computing

Add to Reading List

Source URL: xn--bta-yla.net

Language: English - Date: 2014-12-31 11:24:35
973Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
974Rechargeable batteries / Leadacid battery / Battery / Separator / VRLA battery

Data Sheet NP SERIES - NP2-12 Reliability is your Security Utilizing the latest advance design Oxygen Recombination Technology, Yuasa have applied

Add to Reading List

Source URL: www.yuasabatteries.com

Language: English - Date: 2009-03-05 12:52:05
975Backup software / Computer memory / Business continuity and disaster recovery / Database management systems / Backup / Data security / Extensible Storage Engine / Computer data storage / Dynamic random-access memory / Replication / File system / In-memory database

Fast Crash Recovery in RAMCloud

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-11 16:39:07
976Ethernet / Network management / Bypass switch / Small form-factor pluggable transceiver / DBm / Ixia / Network tap / Network switch / RMON

DATA SHEET IXIA IBYPASS HD Ixia iBypass HD (High Density) provides a 1U, high port density bypass switch solution for in-line network security

Add to Reading List

Source URL: www.ixiacom.com

Language: English - Date: 2016-07-29 13:55:00
977Data security / Information Systems Security Association / Crowne Plaza / Minutes

ISSA: Chapter Board Meeting Minutes November 5, :30am - 1:00pm Crowne PlazaN. IH 35 Austin, TXPresiding Officer: Jacqueline Wilson, President

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2015-11-09 15:07:51
978Data security / Information Systems Security Association / Professional certification / Nonprofit organization / Professional Petroleum Data Management Association / World Institute for Nuclear Security

Information Security Vendors Association (ISVA)

Add to Reading List

Source URL: www.isva-global.org

Language: English - Date: 2013-04-04 11:41:29
979Information technology management / Security / Data security / IT risk management / Risk analysis / IT risk / ISO 31000 / ISO/IEC 27000-series / ISO/IEC 20000 / ISO/IEC 27001:2013 / Risk management / Professional certification

Neue Subnorm ISOfür Risikomanagement

Add to Reading List

Source URL: sk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:36
980Business continuity and disaster recovery / Backup software / Cloud storage / Backup / Data security / Replication / Remote backup service / Veeam Backup & Replication

Storage Storage is a matrix of features and services which cover not only the storage of data but also the number of data copies, over what period files can be retrieved, whether backups are provided, etc. IT is willing

Add to Reading List

Source URL: vpit.rice.edu

Language: English - Date: 2013-06-03 11:04:02
UPDATE