Storage security

Results: 1909



#Item
331Security / Data remanence / Sanitization / Universal Serial Bus / Censorship / National Institute of Standards and Technology / USB mass-storage device class / Data security / Computer hardware / National security

Review of Surplus Procedures for Electronic Devices with Storage – October 2014

Add to Reading List

Source URL: www.apa.virginia.gov

Language: English - Date: 2014-11-10 10:30:13
332Data management / Cloud storage / Data center / Distributed data storage / Networks / Computer security / Concurrent computing / Distributed computing / Computing

Establishing Remote Access to Confidential German Micro Labor Market Data Jörg Heining1,2 and Stefan Bender1 for Employment Research (IAB), Nuremberg, Germany, 2 Corresponding author: Jörg Heining, e-mail: joerg.heinin

Add to Reading List

Source URL: www.statistics.gov.hk

Language: English - Date: 2013-08-22 04:39:17
333Cloud storage / Cloud infrastructure / Data center / Cloud computing security / Cloud computing / Computing / Centralized computing

The Cloud is Only as Secure as its Provider: What to Know Before You Migrate By Lauren Gibbons Paul One of IT’s biggest balancing acts is to make data transactions easily available to authorized users while preventing

Add to Reading List

Source URL: www.qtsdatacenters.com

Language: English - Date: 2014-12-05 16:50:18
334GPS / Geolocation / Tracking / Ubiquitous computing / Satellite navigation systems / Automatic vehicle location / Vehicle tracking system / Geo-fence / Cargo / Technology / Transport / Navigation

Wireless – Paramount in Cargo Security Cargo crime is steadily on the rise. An industry estimate states that losses from cargo, in storage or in transit surpasses $ billion per year, globally. Law enforcement of

Add to Reading List

Source URL: www.idii.com

Language: English - Date: 2011-03-15 17:23:51
335Internet / Electronic commerce / Secure communication / Transport Layer Security / Server / Transparent Data Encryption / Encrypting File System / I2P / Computing / Software / Internet standards

Client Accessible Encrypted Server Storage By combining SSL and Transparent Data Encryption technologies into client-server type architecture we are able to create an encrypted data storage and messaging solution. Simpli

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:37:51
336Disk file systems / Computer memory / Flash file systems / Data security / Non-volatile memory / File system / Data remanence / Ext2 / Computer file / Computing / Data management / Computer hardware

TrueErase: Per-File Secure Deletion for the Storage Data Path Sarah Diesburg, Christopher Meyers, Mark Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, and An-I Andy Wang Florida State University

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2012-09-29 17:54:49
337Computer storage / Information / Local area networks / Data security / Network file systems / Storage area network / Computer network / Computer data storage / Storage Resource Manager / Telecommunications engineering / Computing / Electronic engineering

Microsoft Word - SIGCOMM02p1783-beck.doc

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2009-06-12 12:01:20
338Electricity generation / Energy security / Energy / Natural gas storage / Natural gas / Federal Statistical Office

3rd Gas Data Transparency Conference, Bali, JODI Gas – Gas Data Collection(s) in Germany Jan Benduhn Federal Office of Economics and Export Control

Add to Reading List

Source URL: www.jodidata.org

Language: English - Date: 2014-05-02 05:30:53
339Distributed computing / File sharing networks / Distributed data storage / Digital rights management / Content delivery network / Streaming / Digital Entertainment Content Ecosystem / Conditional access / Ono / Concurrent computing / Computing / Digital television

NDS VideoGuard Connect™ DECE Platform Security Analysis & Recommendations White Paper

Add to Reading List

Source URL: wikileaks.org

Language: English - Date: 2015-04-11 11:52:04
340Computer architecture / Distributed file system / Capability-based security / File system / Ceph / Object storage device / Unix / File descriptor / Lustre / Network file systems / Computing / System software

Scalable Security for Petascale Parallel File Systems Andrew W. Leung Ethan L. Miller Stephanie Jones

Add to Reading List

Source URL: www.ssrc.ucsc.edu

Language: English - Date: 2014-02-12 18:01:49
UPDATE