Storage security

Results: 1909



#Item
971Safety engineering / Security / Occupational safety and health / Environmental social science / Risk management / Hazard / Elevator / Job safety analysis / Safety / Industrial hygiene / Risk

Fatal Facts – Hazards of Stored Materials In early 2014 a self-storage employee in Hawaii died in a completely avoidable tragedy when he attempted to move several large and heavy wood panels without any assistance. Sev

Add to Reading List

Source URL: labor.hawaii.gov

Language: English - Date: 2014-12-26 14:23:32
972Computing / USB flash drive / Data security / Universal Serial Bus / USB mass-storage device class / IronKey / Trusted Computing Group / Trusted Platform Module / BIOS / Computer hardware / USB / Computer security

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, and Weijin Wang Trusted Computing and Information Assurance Laboratory Institute of Sof

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 21:51:08
973Data erasure / Computing / Computer network security / Crime prevention / National security / Encryption / USB flash drive / Data remanence / Computer security / Security / Data security / Cryptography

Information Handling, Use, and Disposal Guidelines Version 1.2 Security Guidelines Information Handling Guidelines Storage, Transmission, Labeling, Reuse, Surplus & Disposal PUBLIC

Add to Reading List

Source URL: www.pacific.edu

Language: English - Date: 2015-01-15 07:54:06
974Data management / Information Risk Management / Data security / Disaster preparedness / Disaster recovery / Business continuity / Cloud storage / Backup / Data center / Emergency management / Management / Public safety

™ Disaster Recovery Continuity in an Uncertain World The Cloud is confusing… well it can be, and that’s where CloudU™ comes in. CloudU is a comprehensive Cloud Computing

Add to Reading List

Source URL: diversitynet.zippykidcdn.com

Language: English - Date: 2014-05-20 12:23:16
975Web services / Computer security / Cloud storage / Computer law / Cloud infrastructure / Amazon Web Services / Amazon Elastic Compute Cloud / Amazon S3 / Amazon.com / Cloud computing / Computing / Centralized computing

Microsoft Word - AWS Risk and Compliance Whitepaper - FINAL[removed]

Add to Reading List

Source URL: d36cz9buwru1tt.cloudfront.net

Language: English - Date: 2013-11-13 11:56:12
976Cloud applications / Cryptography / Password / Two-factor authentication / ICloud / Cloud storage / Dropbox / OTPW / One-time password / Computing / Cloud computing / Security

TLP WHITE Cloud storage and data security 1

Add to Reading List

Source URL: www.cert.gov.uk

Language: English - Date: 2014-09-24 09:38:43
977Financial markets / Biofuels / Technical analysis / Volatility / Futures contract / World food price crisis / Arbitrage / Supply and demand / Theory of storage / Economics / Mathematical finance / Food politics

SAFEGUARDING Food SECURITY in VOLATILE GLOBAL MARKETS Edited by Adam Prakash

Add to Reading List

Source URL: www.fao.org

Language: English - Date: 2011-06-22 11:52:49
978Data security / Cloud storage / Data center / Data management / Distributed data storage / Networks / Vulnerability / Backup / Information security / Computing / Concurrent computing / Security

Data Center Nishi-Tokyo Data Center Canon’s next generation “Reliability” and “Solutions” support future IT infrastructure

Add to Reading List

Source URL: www.canon-its.co.jp

Language: English - Date: 2013-10-22 22:02:36
979Computer storage / Destruction / Office equipment / Paper recycling / Paper shredder / Security / Shredder / Data remanence / Hard disk drive / Information science / Computer hardware / Information

Guide for Disposing of Failed Devices/Media Containing Data University Information Security Office October 2014 If a device or media which potentially contains University data cannot be wiped, the only appropriate recour

Add to Reading List

Source URL: protect.iu.edu

Language: English - Date: 2014-11-11 12:02:11
980Copyright law / Cryptography / Trusted Computing / Public safety / Emergency management / Trusted path / Trusted system / Safety / IBM Tivoli Storage Manager / Security / Computer security / Business law

Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture Timothy E. Levin1 , Jeffrey S. Dwoskin2 , Ganesha Bhaskara3 Thuy D. Nguyen1 , Paul C. Clark1 , Ruby B. Lee2 Cynthia

Add to Reading List

Source URL: www.cisr.us

Language: English - Date: 2009-06-04 09:26:02
UPDATE