Infrastructure security

Results: 6100



#Item
711Computer security / Computer network security / Cloud storage / Data center / Data management / Networks / McAfee / Infrastructure optimization / Network security / Computing / Concurrent computing / Cloud computing

Protecting the Data Center Solution Guide SECURITY CONNECTED

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:03
712Tanzania Communication Regulatory Authority / Data security / Technology / EGovernment in Europe / Government / Development / National Telecommunications and Information Administration / Infrastructure

THE UNITED REPUBLIC OF TANZANIA MINISTRY OF LIVESTOCK AND FISHERIES DEVELOPMENT INFORMATION TECHNOLOGY POLICY Permanent Secretary

Add to Reading List

Source URL: tanzania.go.tz

Language: English - Date: 2014-11-12 07:02:20
713Espionage / Peiter Zatko / @stake / Mudge / BBN Technologies / Black Hat Briefings / Counterintelligence / Critical infrastructure protection / Computer security / L0pht / National security / Security

Mudge aka Peiter Mudge Zatko Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence/Counter Espionage Within Information

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
714United States Department of Homeland Security / Greater Dayton / Wright-Patterson Air Force Base / SCADA / Critical infrastructure protection / National security / United States Air Force / Ohio

Microsoft Word - ConferenceProgram2013.doc

Add to Reading List

Source URL: www.ifip1110.org

Language: English
715Cloud infrastructure / EMC Corporation / Safenet / Hyper-V / VMware / Virtual machine / IBM cloud computing / Eucalyptus / Cloud computing / System software / Software

ProtectV™ Data Protection for the Cloud PRODUCT BRiEF The security risks of virtualization

Add to Reading List

Source URL: www.edvance.com.hk

Language: English - Date: 2013-06-27 09:38:18
716Electronic commerce / Public-key cryptography / Borders of the United States / Electronic data interchange / Information / Public key infrastructure / Australian Customs and Border Protection Service / U.S. Customs and Border Protection / National security / Customs services / Computing / Key management

Microsoft Word - ACCA2011_10.doc

Add to Reading List

Source URL: cargosupport.gov.au

Language: English - Date: 2011-09-12 21:41:47
717Internet / Email privacy / Gmail / Web bug / Webmail / Steganography / Anonymous remailer / Message transfer agent / Public-key cryptography / Email / Computer-mediated communication / Computing

Privacy Preserving Web-Based Email Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory The Pennsylvania State University University

Add to Reading List

Source URL: www.enck.org

Language: English
718Standards / Crimes / Identity theft / Systems engineering process / Information Technology Infrastructure Library / Abstraction / Security / Identity / Information technology management / Method engineering

Evidence of Identity Standard Version 2.0 Department of Internal Affairs December 2009 Version 2.0

Add to Reading List

Source URL: www.dia.govt.nz

Language: English - Date: 2010-02-01 22:29:57
719International Institute for the Unification of Private Law / League of Nations / Securities / Cape Town Treaty / Security interest / Communications protocol / Infrastructure / Port / Law / Private law / Conflict of laws

UNITED NATIONS/THAILAND WORKSHOP ON SPACE LAW “ACTIVITIES OF STATES IN OUTER SPACE IN LIGHT OF NEW DEVELOPMENTS: MEETING INTERNATIONAL RESPONSIBILITIES AND ESTABLISHING NATIONAL LEGAL AND POLICY FRAMEWORKS” (jointly

Add to Reading List

Source URL: www.unoosa.org

Language: English - Date: 2012-11-01 08:35:30
720SMS / Marketing / Short message service center / Network congestion / Denial-of-service attack / Voice-mail / Control channel / Spam / RoS / Technology / Mobile technology / Text messaging

Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks Patrick Traynor, William Enck, Patrick McDaniel, and Thomas La Porta Systems and Internet Infrastructure Security Laboratory Networking and Securi

Add to Reading List

Source URL: www.enck.org

Language: English
UPDATE