Hybrid security

Results: 297



#Item
11European Commission - Press release  Security: EU strengthens response to hybrid threats Brussels, 6 April 2016 The European Commission and the High Representative adopted today a Joint Framework to counter hybrid threat

European Commission - Press release Security: EU strengthens response to hybrid threats Brussels, 6 April 2016 The European Commission and the High Representative adopted today a Joint Framework to counter hybrid threat

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2016-04-06 08:03:33
    12Pragmatic Security for Cloud and Hybrid Networks 
 Version 1.0

    Pragmatic Security for Cloud and Hybrid Networks 
 Version 1.0

    Add to Reading List

    Source URL: securosis.com

    Language: English - Date: 2016-01-21 06:34:24
      13Nominee: Datapipe Nomination title: Thomsons Online Benefits Improved Performance and Security by Moving to a Private Hybrid Cloud Environment Thomsons Online Benefits is a Software-as-a-Service provider of global employ

      Nominee: Datapipe Nomination title: Thomsons Online Benefits Improved Performance and Security by Moving to a Private Hybrid Cloud Environment Thomsons Online Benefits is a Software-as-a-Service provider of global employ

      Add to Reading List

      Source URL: www.svcawards.com

      Language: English - Date: 2015-09-10 05:56:11
        14Drucker Challenge 2015: Managing Oneself in the Digital World  5 Key Challenges for Building, Managing and Leading a Hybrid Workforce Introduction

        Drucker Challenge 2015: Managing Oneself in the Digital World 5 Key Challenges for Building, Managing and Leading a Hybrid Workforce Introduction "IN THE FUTURE, WHEN MICROSOFT LEAVES A SECURITY-FLAW IN THEIR CODE IT

        Add to Reading List

        Source URL: www.druckerchallenge.org

        Language: English - Date: 2015-08-31 04:35:18
          15A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Jürgen Graf† and Chris

          A Hybrid Approach for Proving Noninterference and Applications to the Cryptographic Verification of Java Programs Ralf Küsters∗ , Tomasz Truderung∗ , Bernhard Beckert† , Daniel Bruns† , Jürgen Graf† and Chris

          Add to Reading List

          Source URL: grsrd.uni.lu

          Language: English - Date: 2013-04-09 08:10:38
          16CudaEye Falcon Dome IP Camera Simple, intelligent surveillance CudaEye is an intuitive, multi-site surveillance solution with encrypted hybrid edge-cloud storage and access from most modern browsers and mobile devices. C

          CudaEye Falcon Dome IP Camera Simple, intelligent surveillance CudaEye is an intuitive, multi-site surveillance solution with encrypted hybrid edge-cloud storage and access from most modern browsers and mobile devices. C

          Add to Reading List

          Source URL: www.cudaeye.com

          Language: English - Date: 2015-07-20 23:21:09
          17Program DISC Summer School on Control for Cyber-Physical Systems Center Parcs, Zandvoort, The Netherlands, June 1-4, 2015 Monday, June 1, 2015  Introduction, Security and Hybrid Systems

          Program DISC Summer School on Control for Cyber-Physical Systems Center Parcs, Zandvoort, The Netherlands, June 1-4, 2015 Monday, June 1, 2015 Introduction, Security and Hybrid Systems

          Add to Reading List

          Source URL: www.disc.tudelft.nl

          - Date: 2015-04-14 08:27:02
            18RAPID EYE™ HYBRID HD 16-CHANNEL HYBRID HIGH DEFINITION DIGITAL VIDEO RECORDER (DVR) SYSTEM WITH VIDEO ANALYTICS OPTION The Rapid Eye™ Hybrid HD 16-channel DVR is designed for effective remote access, even over limite

            RAPID EYE™ HYBRID HD 16-CHANNEL HYBRID HIGH DEFINITION DIGITAL VIDEO RECORDER (DVR) SYSTEM WITH VIDEO ANALYTICS OPTION The Rapid Eye™ Hybrid HD 16-channel DVR is designed for effective remote access, even over limite

            Add to Reading List

            Source URL: www.security.honeywell.com

            Language: English - Date: 2013-04-23 09:05:53
              192013 IEEE Symposium on Security and Privacy  A hybrid architecture for interactive verifiable computation Victor Vu, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin questions of t

              2013 IEEE Symposium on Security and Privacy A hybrid architecture for interactive verifiable computation Victor Vu, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin questions of t

              Add to Reading List

              Source URL: ieee-security.org

              Language: English - Date: 2013-04-05 19:56:28
                20The BlueJay Ultra-Lightweight Hybrid Cryptosystem

                The BlueJay Ultra-Lightweight Hybrid Cryptosystem

                Add to Reading List

                Source URL: ieee-security.org

                Language: English - Date: 2012-06-05 18:18:20