Infrastructure security

Results: 6100



#Item
351

Rootkit-Resistant Disks Kevin R. B. Butler, Stephen McLaughlin and Patrick D. McDaniel Systems and Internet Infrastructure Security Laboratory (SIIS) Pennsylvania State University, University Park, PA {butler,smclaugh,m

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2014-09-04 11:27:15
    352Cloud infrastructure / Computer security / Computer network security / Web hosting / Cloud computing / Amazon Web Services / Threat Stack / Threat / Stack / Cloud computing issues / Eucalyptus

    Implementing high-velocity security best practices. A STEP-BY-STEP GUIDE TO

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-03-07 11:09:10
    353Cryptography / Computing / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / E-commerce / Keystore / Java Platform /  Enterprise Edition / Application server / Certificate authority / Java Secure Socket Extension

    J2EE Security for Servlets, EJBs and Web services Pankaj Kumar Software Architect, HP Date: March 28, 2003

    Add to Reading List

    Source URL: pankaj-k.net

    Language: English - Date: 2007-02-02 01:42:32
    354Cloud infrastructure / Cloud applications / System administration / Cloud Computing / Cloud Computing Security / Threat Stack / Docker / Amazon Elastic Compute Cloud / Computer security / Vulnerability / Amazon Web Services

    TH RE AT STA CK C LO UD SE C UR ITY P L AT FO RM T M PRO EDITION Integrate with your process. Our Pro edition provides the ultimate experience and flexibility in workload security.

    Add to Reading List

    Source URL: www.threatstack.com

    Language: English - Date: 2016-03-16 05:37:16
    355

    ZMĚNA JMÉNA DIVIZE Vážení zákazníci, dovolujeme si vám tímto oznámit, že divize Intergraph Security, Government & Infrastructure se, počínaje dnešním dnem, přejmenovala na Hexagon Safety & Infrastructure.

    Add to Reading List

    Source URL: www.intergraph.com

    Language: Czech - Date: 2015-10-14 10:47:20
      356Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / Extended Validation Certificate / Certification Practice Statement / Certificate policy / Public key certificate / Revocation list / Certificate authority / X.509

      Amazon Web Services Certification Practice Statement Version 1.0.2

      Add to Reading List

      Source URL: www.amazontrust.com

      Language: English - Date: 2015-11-04 23:31:46
      357Computing / Cloud computing / Cloud infrastructure / Software architecture / Cloud storage / As a service / Amazon Web Services / Web hosting / Data center / Software as a service / Load balancing / Application server

      BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits to our custome

      Add to Reading List

      Source URL: bebanjo.com

      Language: English - Date: 2016-04-13 04:48:08
      358

      Green Lights Forever: Analyzing the Security of Traffic Infrastructure Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, and J. Alex Halderman Electrical Engineering and Computer Science Department Univers

      Add to Reading List

      Source URL: web.eecs.umich.edu

      Language: English - Date: 2015-09-23 11:33:10
        359Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / Certificate authority / Certificate policy / Public key certificate / CA/Browser Forum / Online Certificate Status Protocol / Revocation list

        Microsoft Word - CAB Forum BRdoc

        Add to Reading List

        Source URL: cabforum.org

        Language: English - Date: 2016-02-01 11:58:08
        360Computing / Cryptography / Security / E-commerce / Mobile security / Bluetooth / Copyright law of the United States / Copyright / Public key infrastructure / Computer security

        Mobile Application Security David Vo (Dvo) Dec 15, 2015 Copyright © 2015 nVisium LLC · www.nvisium.com

        Add to Reading List

        Source URL: nvisium.com

        Language: English - Date: 2015-12-17 16:41:53
        UPDATE