Control system security

Results: 2384



#Item
2011  Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

1 Secure Overlay Cloud Storage with Access Control and Assured Deletion Yang Tang, Patrick P. C. Lee, John C. S. Lui, Radia Perlman Abstract—We can now outsource data backups off-site to third-party cloud storage serv

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-06-30 22:42:56
202Important Information about October 2015 Renewal  Please take a moment to review the following information about the FCB’s on-line certification system that was implemented last year. There are two issues: 1) in regard

Important Information about October 2015 Renewal Please take a moment to review the following information about the FCB’s on-line certification system that was implemented last year. There are two issues: 1) in regard

Add to Reading List

Source URL: flcertificationboard.org

Language: English - Date: 2015-04-21 11:35:37
203OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison {agember,ra

OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison {agember,ra

Add to Reading List

Source URL: agember.com

Language: English - Date: 2014-07-07 17:03:14
204A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2012-01-27 15:46:35
205FortiManager  TM Centralized Security Management Take Control of Your Security Infrastructure

FortiManager TM Centralized Security Management Take Control of Your Security Infrastructure

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:10
206Financial Control Division Support Unit The Financial Control Division Support Unit (FCDSU) Help Ticket is available for downloading at the Department of Finance and Administration (DFA) website under Help Desk. http://w

Financial Control Division Support Unit The Financial Control Division Support Unit (FCDSU) Help Ticket is available for downloading at the Department of Finance and Administration (DFA) website under Help Desk. http://w

Add to Reading List

Source URL: nmdfa.state.nm.us

Language: English - Date: 2015-04-14 12:17:30
207DATASHEET  FortiGuard® Global Security Research and Protection FortiGuard Labs More than 125 security threat researchers, engineers, and forensic specialists comprise

DATASHEET FortiGuard® Global Security Research and Protection FortiGuard Labs More than 125 security threat researchers, engineers, and forensic specialists comprise

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:00
208Conference Progam & Key EventsAugust , 2015 Sheraton on the Park – Elizabeth Street, Sydney Sunday 9th August  Conference Registration

Conference Progam & Key EventsAugust , 2015 Sheraton on the Park – Elizabeth Street, Sydney Sunday 9th August Conference Registration

Add to Reading List

Source URL: www.oceaniacacs2015.org

Language: English - Date: 2015-06-01 18:03:39
209FortiClientTM  Endpoint Security Application FortiClient is an all-in-one comprehensive security solution that extends the power of FortiGate’s unified threat management to endpoints on your network. Desktops, laptops,

FortiClientTM Endpoint Security Application FortiClient is an all-in-one comprehensive security solution that extends the power of FortiGate’s unified threat management to endpoints on your network. Desktops, laptops,

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:13
210Product Brief  Qosmos ixEngine®: Policy Control and Charging (PCC) Use Case For developers of telecom equipment who want to build products to handle the growth of mobile data traffic, provide

Product Brief Qosmos ixEngine®: Policy Control and Charging (PCC) Use Case For developers of telecom equipment who want to build products to handle the growth of mobile data traffic, provide

Add to Reading List

Source URL: www.qosmos.com

Language: English - Date: 2015-03-31 11:09:08