Data-centric security

Results: 37



#Item
11Managing 600 OpenBSD-based Firewalls in Microsoft-Centric Small and Medium Businesses Lawrence Teo www.calyptix.com

Managing 600 OpenBSD-based Firewalls in Microsoft-Centric Small and Medium Businesses Lawrence Teo www.calyptix.com

Add to Reading List

Source URL: www.nycbsdcon.org

Language: English - Date: 2010-12-21 12:59:59
12DATA SHEET  Exonar Raven Integration with Lumeta IPsonar Comprehensive Network Situational Awareness For Information Centric Security: Finding Your Organization’s Crown Jewels and the Unknown Devices on Which They Resi

DATA SHEET Exonar Raven Integration with Lumeta IPsonar Comprehensive Network Situational Awareness For Information Centric Security: Finding Your Organization’s Crown Jewels and the Unknown Devices on Which They Resi

Add to Reading List

Source URL: www.lumeta.com

Language: English - Date: 2014-06-05 15:32:34
13Securely explore your data  BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY

Securely explore your data BULLET-PROOF YOUR BIG APPS WITH DATA-CENTRIC SECURITY

Add to Reading List

Source URL: sqrrl.com

Language: English - Date: 2014-10-07 15:52:42
14Extended Abstract Quantifying the vulnerability of tactical data networks Andy Loebl, James Nutaro, and Teja Kuruganti Oak Ridge National Laboratory {loeblas,nutarojj,kurugantipv}@ornl.gov

Extended Abstract Quantifying the vulnerability of tactical data networks Andy Loebl, James Nutaro, and Teja Kuruganti Oak Ridge National Laboratory {loeblas,nutarojj,kurugantipv}@ornl.gov

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-10 10:52:18
15UNCLASSIFIED  Maritime Domain Awareness Data Sharing Jay Spalding, U. S. Coast Guard Presentation to USCG MDA Day

UNCLASSIFIED Maritime Domain Awareness Data Sharing Jay Spalding, U. S. Coast Guard Presentation to USCG MDA Day

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2007-12-07 15:28:18
16Cisco Application Centric Infrastructure and A10 Networks Thunder Application Delivery Controllers Deliver Dynamic Layer 4 through 7 Services What You Will Learn Modern data centers are increasingly focused on applicatio

Cisco Application Centric Infrastructure and A10 Networks Thunder Application Delivery Controllers Deliver Dynamic Layer 4 through 7 Services What You Will Learn Modern data centers are increasingly focused on applicatio

Add to Reading List

Source URL: www.cisco.com

Language: English
17Application Centric Infrastructure Cisco IT Insights What Fast-growing industry trends and new operational models – notably, cloud computing, big data, and software-defined networking – are driving the need for an ag

Application Centric Infrastructure Cisco IT Insights What Fast-growing industry trends and new operational models – notably, cloud computing, big data, and software-defined networking – are driving the need for an ag

Add to Reading List

Source URL: www.cisco.com

Language: English
18Data-Centric Middleware support for ASIL assessment and decomposition in open automotive systems Jelena Frtunikj, M.Sc., fortiss GmbH, München, Deutschland Michael Armbruster, Dr., Siemens AG, Corporate Research and Tec

Data-Centric Middleware support for ASIL assessment and decomposition in open automotive systems Jelena Frtunikj, M.Sc., fortiss GmbH, München, Deutschland Michael Armbruster, Dr., Siemens AG, Corporate Research and Tec

Add to Reading List

Source URL: www6.in.tum.de

Language: English - Date: 2014-01-15 11:17:30
19Data Centric Solutions for Secure Information Sharing: Secure Access Management for Secure Operational Network (SAMSON) TDP

Data Centric Solutions for Secure Information Sharing: Secure Access Management for Secure Operational Network (SAMSON) TDP

Add to Reading List

Source URL: asmg-ltd.com

Language: English - Date: 2014-11-13 13:20:16
20Getting to the essence of ‘Cyber’  A security model proposal for Privacy by Design (PbD) (using data centric security methods accommodating data’s controls and protections)

Getting to the essence of ‘Cyber’ A security model proposal for Privacy by Design (PbD) (using data centric security methods accommodating data’s controls and protections)

Add to Reading List

Source URL: www.sciap.org

Language: English - Date: 2014-10-22 23:55:47