Storage security

Results: 1909



#Item
141

SNIA Data Storage Security Summit Event Overview August 18, 2015 SNIA Leadership Wayne Adams

Add to Reading List

Source URL: www.snia.org

Language: English - Date: 2015-08-24 19:14:15
    142Cryptography / Database / Key management / Cloud storage / Encryption / Database encryption / Cloud computing security

    Silverline: Toward Data Confidentiality in Storage-Intensive Cloud Applications Krishna P. N. Puttaswamy Christopher Kruegel

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2011-08-30 11:54:47
    143Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Internet privacy / Information security / Cloud storage

      Box  Acceptable  Use  Policy  at  the  University  of  Utah       Box.com is cloud storage that provides users with the ability to easily store, access and share

    Add to Reading List

    Source URL: it.utah.edu

    Language: English - Date: 2015-03-06 09:55:04
    144

    AT A GLANCE PCI DATA STORAGE PCI Data Storage Do’s and Don’ts Requirement 3 of the Payment Card Industry’s Data Security Standard (PCI DSS) is to “protect stored cardholder data.” The public assumes merchants a

    Add to Reading List

    Source URL: www.emerchant.com

    Language: English
      145

      An Overview of Issues and Recent Developments in Cloud Computing and Storage Security Everaldo Aguiar, Yihua Zhang, and Marina Blanton Abstract The recent rapid growth in the availability and popularity of cloud services

      Add to Reading List

      Source URL: www.cse.nd.edu

      Language: English - Date: 2013-02-17 15:35:01
        146Health / Food and drink / Personal life / Federal assistance in the United States / Food storage / Pantry / Rooms / Supplemental Nutrition Assistance Program / Food security / Hunger in the United States / Food bank / Hunger

        INSTITUTE of PUBLIC POLICY Harry S Truman School of Public Affairs POLICY BRIEF Report

        Add to Reading List

        Source URL: foodsecurity.missouri.edu

        Language: English - Date: 2013-02-07 18:40:04
        147Computing / Systems engineering / Technology / Software / Middleware / Database / Open standard / Internet security / Provisioning / Oracle Corporation / Message-oriented middleware / Storage security

        Microsoft Word - IAO 12Feb07.doc

        Add to Reading List

        Source URL: www.it.vt.edu

        Language: English - Date: 2013-02-07 15:13:17
        148

        Efficient Oblivious Transfer in the Bounded-Storage Model Dowon Hong, Ku-Young Chang, and Heuisu Ryu Information Security Research Division, ETRI 161 Gajeong-Dong, Yuseong-Gu, Daejeon, , KOREA {dwhong,jang1090,hsr

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-08-31 13:50:32
          149

          Offline Hard Disk Imaging Using write-blocking hardware and Helix CD Imaging Note: These commands assume sdb is evidence and sdc is image storage. 1. Find devices dmesg | grep hd

          Add to Reading List

          Source URL: www.security.vt.edu

          Language: English - Date: 2016-02-28 22:58:48
            150

            Partnering for Success with Barracuda Why Partner with Barracuda? Resellers and MSPs partner with Barracuda to solve their customers IT challenges in security, storage and application delivery. Barracuda’s business mod

            Add to Reading List

            Source URL: www.barracuda.com

            Language: English - Date: 2015-05-18 13:44:39
              UPDATE