Infrastructure security

Results: 6100



#Item
861Computer security / Cloud infrastructure / Software as a service / Application firewall / Cloud API / Platform as a service / Virtual machine / Application security / VMware / Cloud computing / Computing / Centralized computing

Performance analysis of OFDM modulation on indoor broadband PLC channels

Add to Reading List

Source URL: www.jisajournal.com

Language: English
862Sharing / Saab Automobile / Transport / European Network and Information Security Agency / CoFFEE

ENISA Workshop on Protection of Electronic Communications Infrastructure and Information Sharing Bucharest, Romania – 16 th of June 2015 Draft Agenda Time

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
863Cloud applications / Computer security / Cloud infrastructure / Software as a service / Web 2.0 / Malware / Mobile cloud computing / Web threat / Cloud computing / Centralized computing / Computing

Microsoft Word - Essential Guide to Cloud Security.doc

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
864Cloud infrastructure / Computer storage / Data security / Cloud storage / Backup / Storage area network / Disk encryption / Database / Converged storage / Cloud computing / Computing / Centralized computing

Defending Cloud Data with Infrastructure Encryption Version 1.0 Released: July 12, 2013

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-07-22 15:54:06
865Critical infrastructure protection / Change Advisory Board / Change request / Management / Security / Business / Change control / Systems engineering / Information technology management / Change management

Tracking Changes with the Novo Change Manager The Challenge: Electric Utility companies are responsible for generating and distributing electricity while maintaining a healthy and stable electrical grid. A utility compan

Add to Reading List

Source URL: www.novosolutions.com

Language: English - Date: 2012-06-15 12:02:30
866Software testing / Hacking / SAINT / Vulnerability / Penetration test / Attack / Zero-day attack / Cracking of wireless networks / Computer security / Cyberwarfare / Computer network security

» GROUP TEST l Vulnerability assessment This month’s group of products enable testing of the infrastructure, and make security assessments easy or, at least, easier, says Peter Stephenson. he environments in which we

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2008-08-18 12:46:26
867Emergency management / Risk / Disaster preparedness / Humanitarian aid / Occupational safety and health / Critical infrastructure protection / Emergency / Civil defense / Risk management / Public safety / Management / National security

A FRAMEWORK FOR MAJOR EMERGENCY MANAGEMENT A Framework enabling An Garda Síochána, the Health Service Executive and Local Authorities to prepare for and make a co-ordinated response to major emergencies resulting from

Add to Reading List

Source URL: www.justice.ie

Language: English - Date: 2012-11-13 04:36:40
868Infrastructure / Security / Supply chain security / Chennai Port / Transport / Port / Containerization

March 2015 About ICHCA – International Cargo Handling Coordination Association The International Cargo Handling Coordination Association (ICHCA) is an international, independent, notfor-profit organisation dedicated to

Add to Reading List

Source URL: www.ichca-australia.com

Language: English - Date: 2015-04-09 06:02:32
869Internet protocols / Routing protocols / Routing / IP hijacking / Border Gateway Protocol / Router / Peering / Traceroute / Geolocation / Internet / Network architecture / Computing

CYBER SECURITY DIVISION
 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet topology and performance analytics for mapping critical network infrastructure

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 19:28:54
870Crime prevention / Law enforcement / Police / Public safety / Surveillance / National security / Security / Law

Public document VEOHRC Response to Victoria Police Action Plan Community Consultation on Field Contacts and Cross-Cultural Training Year One Create/establish infrastructure

Add to Reading List

Source URL: www.communitylaw.org.au

Language: English - Date: 2014-01-13 20:14:31
UPDATE