Storage security

Results: 1909



#Item
451Physics / Apache Cassandra / NoSQL / Structured storage / Social networking service / Euclidean vector / Matrix / Social graph / Data management / Social networks / Mathematics

SocialImpact: Systematic Analysis of Underground Social Dynamics ⋆ Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Te

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2012-07-09 02:25:28
452Non-volatile memory / Electronics / Computer storage / Microcontrollers / EEPROM / PIC16x84 / EPROM / Atmel AVR / Flash memory / Computer memory / Computer hardware / Computing

Data remanence in non-volatile semiconductor memory (Part II) Computer Laboratory Security Group

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:53
453Backup / Data security / EMC Corporation / Cloud backup / Remote backup service / Replication / Data center / EMC NetWorker / Mozy / Computing / Backup software / Cloud storage

Backup as a Service Backup as a Service The Backup Challenge Regardless of industry, sector or size of workforce, one thing is certain: all organizations are generating ever-greater volumes of data. An often quoted sta

Add to Reading List

Source URL: www.iomart.com

Language: English - Date: 2014-10-30 10:47:18
454Centralized computing / Data security / Data protection / Backup software / Cloud clients / Riverbed Technology / Cloud storage gateway / Backup / Rackspace Cloud / Cloud computing / Computing / Cloud storage

DATA SHEET OVERVIEW Thousands of organizations worldwide rely on Riverbed to extract more value from existing storage, application, and network investments. Key Whitewater Benefits

Add to Reading List

Source URL: www.datum.com.sg

Language: English - Date: 2012-05-22 05:53:18
455Data security / Backup / Computer data storage / Database / RMAN / Data management / Remote backup service / Off-site data protection / Computing / Backup software / Information technology management

The Data Accessibility Gamble: What is Your Enterprise Wagering? Maximize Accessibility and Minimize the Risk Stored in Your Enterprise Data This document does not provide legal or other professional advice and should

Add to Reading List

Source URL: www.krollontrack.com

Language: English - Date: 2015-04-01 11:58:22
456Electronics / Computing / Server / IP camera / Closed-circuit television / Sony / Streaming media / Failover / Recording at the edge / Surveillance / Video / Technology

Edge Storage Sony and Milestone Solution Collaborate for Video Security Ensuring the continuous availability of recorded audio and video in the event of network or server failure Sony Electronics and Milestone Systems ar

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2013-10-08 12:17:43
457Cloud computing / Akamai Technologies / Content delivery network / Cloud storage / File sharing / Peercasting / Application firewall / Application security / Computing / Concurrent computing / Computer security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Client Reputation Client Reputation data is used to improve security decisions. Billions of IP addresses interact with the Akamai Intelligent Platform every month. The

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-08 06:50:03
458Cloud infrastructure / Web services / Amazon Elastic Compute Cloud / Virtual firewall / Cloud storage / Utility computing / Amazon Web Services / IBM cloud computing / Cloud.com / Cloud computing / Computing / Centralized computing

Cloud Hooks: Security and Privacy Issues in Cloud Computing

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2010-11-27 16:02:00
459Security / Secure communication / Internet standards / Computer network security / Transport Layer Security / Password / Public-key cryptography / HTTP Secure / Session hijacking / Cryptography / Cryptographic protocols / Computing

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2013-01-25 08:24:32
460Internet privacy / Information privacy / Personally identifiable information / Data Privacy Day / Information privacy law / Privacy / Ethics / Privacy policy

STUDENT DATA PRIVACY AND SECURITY: A ROADMAP FOR SCHOOL SYSTEMS1 Managing student data privacy and security is an active process, requiring ongoing attention and vigilance. This roadmap is intended as a guide for school

Add to Reading List

Source URL: storage.googleapis.com

Language: English - Date: 2014-03-24 20:53:54
UPDATE