Storage security

Results: 1909



#Item
61Software / Computing / Computer security / Computer network security / Cyberwarfare / Cloud computing / Cloud storage / OwnCloud / Application firewall / Fail2ban / Intrusion detection system / Denial-of-service attack

Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-05-20 05:22:47
62Security / Nuclear technology / Infrastructure / Environment / San Onofre Nuclear Generating Station / Southern California Edison / Dry cask storage / Cryptography / National security / Holtec International / Corrosion / Computer security

Microsoft PowerPointFinal Holtec CEP DIDpptx

Add to Reading List

Source URL: www.songscommunity.com

Language: English - Date: 2015-07-23 19:05:20
63Backup software / Business continuity and disaster recovery / Computing / Backup / System software / Software / Cloud storage / Data security / Remote backup service / Server

CLIENT SUCCESS STORY PROTRAVEL INTERNATIONAL KNOWS FROM EXPERIENCE THAT THEIR DATA IS SAFE AND EASILY RETRIEVABLE WITH KeepItSafe THE CHALLENGE “When you’re panicked

Add to Reading List

Source URL: www.keepitsafe.ca

Language: English - Date: 2016-08-18 06:15:35
64Cryptography / End-to-end encryption / Computing / Cloud storage / Cloud computing / Online backup services / Cloud computing security / Centralized computing / Deterministic encryption

Leakage-Abuse Attacks against Searchable Encryption David Cash Paul Grubbs

Add to Reading List

Source URL: paul.rutgers.edu

Language: English - Date: 2015-10-27 14:52:24
65Energy economics / Energy policy of the European Union / World energy consumption / Natural gas / Shale gas / Energy security / Energy industry / Sustainable energy / Carbon capture and storage / Energy development / Fossil fuel / Renewable energy

Ladies and gentlemen! These are interesting times for the global natural gas industry. Over the past decade, technology and investment have shown us the path to unlocking and utilizing the vast abundance of natural gas t

Add to Reading List

Source URL: www.gazpromexport.com

Language: English - Date: 2012-06-06 07:18:00
66Distributed data storage / Computer network security / Reputation management / Sybil attack / Distributed hash table / Routing / Flow network / Distributed computing

Canal: Scaling Social Network-Based Sybil Tolerance Schemes Bimal Viswanath Mainack Mondal Krishna P. Gummadi

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-02-20 17:16:43
67Cloud storage / Cloud computing / Cloud infrastructure / Data security / Attribute-based encryption / Public-key cryptography / Encryption / Key management / Cloud computing security / HP Cloud

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 07:38:35
68Cloud infrastructure / Cloud storage / CloudPassage / Computer security / Cloud computing / VMware / Orchestration / Provisioning / Data center / HP CloudSystem / HP Business Service Automation

SOLUTION BRIEF Automated Security and Compliance. Preserves the Agility of Your VMware Environments. SECURING YOUR VMWARE INFRASTRUCTURE

Add to Reading List

Source URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.com

Language: English - Date: 2016-05-25 17:32:00
69Climate change policy / Carbon finance / Emissions trading / Environmental economics / American Clean Energy and Security Act / Carbon tax / Carbon credit / Carbon emission trading / Clean coal / Carbon capture and storage / Carbon offset / New Zealand Emissions Trading Scheme

Summary of the Waxman-Markey Bill Articles of Interest: “Waxman-Markey Bill: No Cuts until 2026.” International Rivers. “Waxman-Markey Gives Nearly 5 Times More to

Add to Reading List

Source URL: ejmatters.org

Language: English - Date: 2010-11-04 01:42:24
70Distributed data storage / Computer network security / Multi-agent systems / Spamming / File sharing networks / Botnet / Storm botnet / Peer-to-Peer Protocol / Kademlia / Distributed hash table / Command and control / Peer-to-peer

Towards Complete Node Enumeration in a Peer-to-Peer Botnet Brent ByungHoon Kang1 , Eric Chan-Tin2 , Christopher P. Lee3 , James Tyra2 , Hun Jeong Kang2 , Chris Nunnery1 , Zachariah Wadler1 , Greg Sinclair1 , Nicholas Hop

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
UPDATE