Storage security

Results: 1909



#Item
121

Security in Distributed Storage Systems arXiv:1005.0426v1 [cs.CR] 4 May 2010 by Communicating a Logarithmic Number of Bits Theodoros K. Dikaliotis

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-05-04 22:03:44
    122Firearm safety / Safety / Containers / Gun safe / Handgun / Safe / Security / Prevention / Gun laws in California

    Microsoft PowerPoint - Safe Storage_January 2016.pptx

    Add to Reading List

    Source URL: www.dps.texas.gov

    Language: English - Date: 2016-01-22 14:39:18
    123Computing / Cloud infrastructure / Apache Software Foundation / Network file systems / Cluster computing / Hadoop / OpenStack / Apache Hadoop / Apache Spark / Cloud computing / Big data / Cloud storage

    The 5th Annual Henry Taub International TCE Conference, JuneAuditing, Security and Data Analytics for Cloud Object Stores Shelly Garion and Yaron Weinsberg IBM Research Haifa

    Add to Reading List

    Source URL: tce.technion.ac.il

    Language: English - Date: 2015-06-18 08:12:15
    124Crime prevention / Cryptography / Information governance / National security / Computer security / Internet privacy / Privacy / Information security / Intellectual property / Acceptable use policy / Information privacy law / Terms of service

    Box Acceptable Use Policy at the University of Utah Box.com is cloud storage that provides users with the ability to easily store, access and share files and folders anywhere they can connect to the Internet. As a user o

    Add to Reading List

    Source URL: it.utah.edu

    Language: English - Date: 2015-03-06 09:53:02
    125

    The Great Marriage: Software and Security Integrated products protect, serve and sell By Julia Shih To maximize their assets and stay competitive, self-storage owners look for ways to incorporate the latest technology in

    Add to Reading List

    Source URL: www.scanshell-store.com

    Language: English - Date: 2005-12-06 15:07:57
      126

      OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

      Add to Reading List

      Source URL: www.ironmountain.gr

      Language: English
        127Carbon sequestration / Carbon dioxide / Unmanned spacecraft / Geography / Geographic data and information / Earth observation satellites / Carbon capture and storage / Imaging / Remote sensing / Satellite imagery / DigitalGlobe / Multispectral image

        CASE STUDY 07 Technical University Madrid Carbon Storage Monitoring Monitoring Carbon Storage Security with Satellite Imagery With worldwide coal-powered plant capacity set to increase by 35% before 2020 and hence increa

        Add to Reading List

        Source URL: www.euspaceimaging.com

        Language: English - Date: 2014-08-22 06:19:11
        128Computing / Cloud computing / Cloud infrastructure / Network file systems / Cloud computing security / Computer security / Cloud storage / Internet privacy / Cloud computing issues / IBM cloud computing

        Cloudopsy: an Autopsy of Data Flows in the Cloud Angeliki Zavou1 , Vasilis Pappas1 , Vasileios P. Kemerlis1 , Michalis Polychronakis1 , Georgios Portokalidis2 , and Angelos D. Keromytis1 1

        Add to Reading List

        Source URL: www.cs.columbia.edu

        Language: English - Date: 2013-04-27 18:27:01
        129Personal life / Food and drink / Food storage / Pantry / Rooms / Economy of the United States / Food security / Food bank / Hunger / Supplemental Nutrition Assistance Program / Survey methodology / Sampling

        Copy of CMFB sampling with completions.xls

        Add to Reading List

        Source URL: foodsecurity.missouri.edu

        Language: English - Date: 2012-09-20 12:38:00
        130Computer hardware / Computing / Apple Inc. / Computer peripherals / Classes of computers / Personal computing / Laptop / Door / Computer monitor / Apple Keyboard / Computer keyboard / IPad

        IN T EG R AT E Wall Charting and Computing Stations Integrate Wall Cabinets provide space efficient security and storage for monitors, keyboards, laptops, scanners, CPUs, and medical charts. Engineered for healthcare env

        Add to Reading List

        Source URL: www.peterpepper.com

        Language: English - Date: 2015-01-23 09:41:30
        UPDATE