Data-centric security

Results: 37



#Item
11Computing / OpenBSD / Cyberwarfare / Data security / Firewall / PF / OpenVPN / Comparison of firewalls / PfSense / Computer network security / System software / Software

Managing 600 OpenBSD-based Firewalls in Microsoft-Centric Small and Medium Businesses Lawrence Teo www.calyptix.com

Add to Reading List

Source URL: www.nycbsdcon.org

Language: English - Date: 2010-12-21 12:59:59
12Lumeta Corporation / Cyberwarfare / Information security / Data loss prevention software / Computing / Internet Mapping Project / Computer security / Computer network security / Security

DATA SHEET Exonar Raven Integration with Lumeta IPsonar Comprehensive Network Situational Awareness For Information Centric Security: Finding Your Organization’s Crown Jewels and the Unknown Devices on Which They Resi

Add to Reading List

Source URL: www.lumeta.com

Language: English - Date: 2014-06-05 15:32:34
13Big data / Data modeling / Technology development / Technology forecasting / Transaction processing / Data / Technology / Data management / Information technology management

Securely explore your data BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2014-10-07 15:52:42
14Net-centric / Military science / System of systems / Systems theory / Computer security / Network-centric warfare / Configuration management / Information technology management / PM Warfighter Information Network-Tactical / Security / Systems engineering / Command and control

Extended Abstract Quantifying the vulnerability of tactical data networks Andy Loebl, James Nutaro, and Teja Kuruganti Oak Ridge National Laboratory {loeblas,nutarojj,kurugantipv}@ornl.gov

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-10 10:52:18
15Maritime domain awareness / Global Maritime Situational Awareness / Homeland Security Information Network / Government / National security / Net-centric / United States Department of Homeland Security / Military

UNCLASSIFIED Maritime Domain Awareness Data Sharing Jay Spalding, U. S. Coast Guard Presentation to USCG MDA Day

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2007-12-07 15:28:18
16Computer networking / Cisco Systems / Deep packet inspection / Videotelephony / Electronics / Computer security / A10 Networks / Computer appliance / Application firewall / Computing / Technology / Network management

Cisco Application Centric Infrastructure and A10 Networks Thunder Application Delivery Controllers Deliver Dynamic Layer 4 through 7 Services What You Will Learn Modern data centers are increasingly focused on applicatio

Add to Reading List

Source URL: www.cisco.com

Language: English
17Deep packet inspection / Network security / Cloud computing / Electronic engineering / Technology / Cisco Career Certifications / Videotelephony / Computing / Cisco Systems

Application Centric Infrastructure Cisco IT Insights What Fast-growing industry trends and new operational models – notably, cloud computing, big data, and software-defined networking – are driving the need for an ag

Add to Reading List

Source URL: www.cisco.com

Language: English
18Safety / Reliability engineering / Functional Safety / ISO 26262 / Safety Integrity Level / Middleware / Asil / Safety engineering / Decomposition / Systems engineering / Risk / Security

Data-Centric Middleware support for ASIL assessment and decomposition in open automotive systems Jelena Frtunikj, M.Sc., fortiss GmbH, München, Deutschland Michael Armbruster, Dr., Siemens AG, Corporate Research and Tec

Add to Reading List

Source URL: www6.in.tum.de

Language: English - Date: 2014-01-15 11:17:30
19Computer security / Data security / Information security / National security / Public safety / Security / Cryptography / Cryptographic software

Data Centric Solutions for Secure Information Sharing: Secure Access Management for Secure Operational Network (SAMSON) TDP

Add to Reading List

Source URL: asmg-ltd.com

Language: English - Date: 2014-11-13 13:20:16
20Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Internet privacy / Privacy / Malware / Cyber-security regulation / Ethics / Security / Computer network security

Getting to the essence of ‘Cyber’ A security model proposal for Privacy by Design (PbD) (using data centric security methods accommodating data’s controls and protections)

Add to Reading List

Source URL: www.sciap.org

Language: English - Date: 2014-10-22 23:55:47
UPDATE