Infrastructure security

Results: 6100



#Item
241Cloud computing / Computer security / Secure communication / Cloud infrastructure / Cloud computing security / Password / Dropbox / Cloud Security Alliance / Data breach / Insider threat / Cloud computing issues / HP Cloud

cloudreport_2015_Q1_cover_GOV_v2

Add to Reading List

Source URL: uploads.skyhighnetworks.com

Language: English - Date: 2015-05-20 16:28:17
242Cloud infrastructure / Business continuity and disaster recovery / Data security / Dimension Data Holdings / Computer security / Backup / Cloud computing

GLMKPP00027 Conservation Infographic 7

Add to Reading List

Source URL: www.dimensiondata.com

Language: English - Date: 2016-04-20 07:57:10
243Public-key cryptography / Key management / Public key infrastructure / E-commerce / Public key certificate / Transport Layer Security

Order Form: APEX 2016 ADDITIONAL Certificates Your chance to give a “pat on the back” to deserving staff, freelancers and vendors. If you won an APEX 2016 Award (or Awards), you may want to order additional award cer

Add to Reading List

Source URL: apexawards.com

Language: English - Date: 2016-06-15 18:05:56
244Software testing / Cloud infrastructure / Automation / Test automation / Cloud computing / Landesbank Baden-Wrttemberg / Computer security

Baden-Württembergische_Bank_text_logo_black

Add to Reading List

Source URL: testobject.com

Language: English - Date: 2016-06-06 10:28:57
245Public-key cryptography / Cryptography / Public key infrastructure / Encryption / Attribute-based encryption / PKE / Digital signature / Side-channel attack / RSA

Hello everybody ! See you at the next conference!

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:24
246Public-key cryptography / Key management / Cryptography / Public key infrastructure / Transport Layer Security / Usability / Computer security / Email / Mobile security

Toward Usable Security Dirk Balfanz, Palo Alto Research Center Traditionally, security and usability have been considered to be a design trade-off, where the user ends up with one or the other, but not both. We believe t

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-05-05 09:39:31
247Cyberwarfare / Cybercrime / National security / Computer network security / Computer security / Cryptography / Federal Energy Regulatory Commission / Critical infrastructure protection

[Presenter’s Name] [Presenter’s Title]

Add to Reading List

Source URL: www.wecc.biz

Language: English - Date: 2016-05-26 17:33:49
248Computer security / Cloud infrastructure / CloudPassage / Cloud computing / Halo / IBM cloud computing / HP Business Service Automation

SOLUTION BRIEF CloudPassage Halo Agent in Audit Mode Protect cloud computing with continuous visibility, oversight and audit controls. Gain immediate and direct views into the security

Add to Reading List

Source URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.com

Language: English - Date: 2016-05-25 17:31:09
249United States Department of Homeland Security / Cyberwarfare / Infrastructure / National security / Counter-terrorism / InfraGard / Publicprivate partnership / Critical infrastructure / Emergency management / Computer security / Critical infrastructure protection / National Cyber Security Division

Contents Introduction ............................................................................................................................................................. 1 Project Background: Process and Parti

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2016-07-27 14:35:14
250Cloud infrastructure / Cloud computing / OpenStack / Rackspace

CLOUD IT CONSULTING | SECURE MANAGED SERVICES | AWS RESELLER www.REANCloud.com AWS Security Architect REAN Cloud Solutions, a Premier AWS Partner is growing substantially and looking for a strong Security Architect to jo

Add to Reading List

Source URL: reancloud.com

Language: English
UPDATE