Storage security

Results: 1909



#Item
251USB flash drive / Universal Serial Bus / USB mass-storage device class / Two-factor authentication / Encryption / Non-volatile memory / IronKey / Cryptographic software / USB flash drive security / Computer hardware / USB / Disk encryption

Investigating ‘secure’ USB sticksReport Investigating ‘secure’ USB sticks Classification PUBLIC

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:05
252Cloud storage / Internet security / Cryptographic software / Special purpose file systems / Computer security / System software / Encrypting File System / Comparison of online backup services / Computing / Backup / Data security

My Docs Online Security http://www.mydocsonline.com/security.html The My Docs Online development team is comprised of former Senior Principal Computer Scientists from a leading Internet security firm. Their primary secur

Add to Reading List

Source URL: www.mydocsonline.com

Language: English - Date: 2014-05-02 12:05:25
253Software / Information science / Electronics / SCCA National Sports Car Championship / Computer network security / Metasploit Project / BP / DVD / HD Moore / Audio storage / Computer storage media / Consumer electronics

D E C I P H E R S E C U R I T Y F E B RUA RY 2 - 3 ,

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:50:50
254Peer-to-peer / Computer security / Distributed hash table / Johann Jakob Heckel / Malware / Kademlia / Blacklist / Mannheim / Hash table / Distributed data storage / File sharing networks / Computing

Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia Philipp C. Heckel, University of Mannheim,

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:52:55
255Cloud storage / Distributed computing / Backup / Data security / Web hosting / Data center / Remote backup service / Cloud backup / Computing / Concurrent computing / Backup software

VOLICO Enterprise Hosting Solutions Backup Service Solutions

Add to Reading List

Source URL: www.volico.com

Language: English - Date: 2014-01-10 16:17:57
256Online backup services / Cloud storage / Backup / Data security / USB flash drive / Solid-state drive / Data loss / File system / Disk enclosure / Computing / Software / Backup software

IndyLaptops Customer Care Document: BKUPN. College Ave. Suite 1 ● Indianapolis, IN 46280 ● ● www.IndyLaptops.com Welcome To Different. Welcome to IndyLaptops. Avoid A Data/File Loss Disaster. B

Add to Reading List

Source URL: www.indylaptops.com

Language: English - Date: 2012-07-19 02:13:46
257Cloud storage / Data center / Data management / Distributed data storage / Networks / IP address / Internet / Upgrade / Computing / Concurrent computing / Distributed computing

Performance and Security Upgrade: NEW ENHANCED DATA CENTER As part of our commitment to providing the best products and service to our clients that we possibly can, Watch Systems is in the midst of a major perfo

Add to Reading List

Source URL: www.watchsystems.com

Language: English - Date: 2015-04-30 18:00:40
258Distributed computing / File sharing networks / File sharing / Intellectual property law / Peer-to-peer computing / Peer-to-peer / Distributed hash table / Kademlia / ANts P2P / Computing / Concurrent computing / Distributed data storage

Lecture 25: Security Issues in Structured Peer-to-Peer Networks Lecture Notes on “Computer and Network Security” by Avi Kak () April 16, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-16 10:33:48
259Cloud storage / Government of India / Data center / Data management / Distributed data storage / Networks / Server / IBM Lotus Notes / Computer security / Computing / Concurrent computing / Distributed computing

Annexure-IV-A Details of State Data Centre available and recommended by the State/UT

Add to Reading List

Source URL: ncrb.nic.in

Language: English - Date: 2008-04-30 01:36:42
260Cloud computing / Akamai Technologies / Content delivery network / Cloud storage / File sharing / Peercasting / Application firewall / Application security / Computing / Concurrent computing / Computer security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Client Reputation Client Reputation data is used to improve security decisions. Billions of IP addresses interact with the Akamai Intelligent Platform every month. The

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2015-04-08 06:50:03
UPDATE