Infrastructure security

Results: 6100



#Item
71Computing / Cloud infrastructure / Cloud computing / VMware / OpenStack / Software-defined networking / Virtualization / Software-defined data center / Altor Networks / IBM cloud computing

Check Point vSEC for Private and Public Clouds | White Paper CHECK POINT VSEC ADAPTIVE SECURITY FOR PRIVATE AND

Add to Reading List

Source URL: www.compugraf.com.br

Language: English - Date: 2016-02-02 11:14:45
72Security / Prevention / Cyberwarfare / National security / Safety / Cybercrime / Infrastructure / NIST Cybersecurity Framework / Resilience / Computer security / Cyber-attack / Psychological resilience

Cyber Resiliency Engineering Aid - Cyber Resiliency Techniques

Add to Reading List

Source URL: www.defenseinnovationmarketplace.mil

Language: English - Date: 2015-10-09 09:54:58
73Cryptography / Public-key cryptography / Public key infrastructure / Cryptographic protocols / Key management / Transport Layer Security / Public key certificate / X.509 / Certificate authority / Transmission Control Protocol / Internet Key Exchange

Item Title Consolidated iTC Feedback – DNcPPv2 SD Reviewer iTC Editorial Team Item Identifier NDcPPv2 Supporting Document

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-07-22 09:29:08
74Computing / Cloud computing / Cloud infrastructure / Computer security / Cloud computing security / Cloud computing issues / HP Cloud

Thought Leadership Making cloud work for business We are regularly told in survey after survey that corporate concerns about security are the biggest barrier to

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:06:42
75Wireless networking / Cryptography / Technology / Computing / Vehicular ad hoc network / Wireless ad hoc network / Key distribution / Vehicular communication systems / Public-key cryptography / Key management / Vehicle-to-vehicle / Man-in-the-middle attack

GlobecomCommunication and Information System Security Symposium Probabilistic Key Distribution in Vehicular Networks with Infrastructure Support Jo˜ao Almeida∗ , Saurabh Shintre∗† , Mate Boban∗† , and

Add to Reading List

Source URL: mateboban.net

Language: English - Date: 2013-07-15 15:54:45
76Computing / Cloud computing / Cloud infrastructure / Bring your own device / Mobile device management / Software as a service

Security in an Age of Zero Trust Jon Oberheide CTO, Duo Security, Inc. Introduction

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-18 22:19:56
77Security / Computer security / Cyberwarfare / Computer network security / Crime prevention / Cryptography / National security / Government procurement in the United States / Critical infrastructure protection / NIST Cybersecurity Framework

DEFENSE CYBERSECURITY REQUIREMENTS: WHAT SMALL BUSINESSES NEED TO KNOW Office of Small Business Programs, U.S. Department of Defense 3600 Defense Pentagon, Room 3E185, Washington, DCWhy is cybersecurity impor

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
78Cryptography / Computing / Computer access control / Transport Layer Security / Public-key cryptography / Cryptographic protocols / Secure communication / Man-in-the-middle attack / Mutual authentication / Authentication / Public key infrastructure / Phishing

IdenTrust™: Beyond SSL and Multifactor Authentication Eliminating Man-in-the-Middle Attacks with IdenTrust™ A Preventative, Proactive Approach to Securing Electronic Transactions Many financial institutions believe t

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2014-05-01 19:01:13
79Cryptography / Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Public key certificate / Certificate authority / Revocation list / Online Certificate Status Protocol / Root certificate / KPN / Certification Practice Statement

Relying Party Agreement - versionThe Relying Party Agreement (RPA) below applies to certificates issued by KPN. However, the certificate that referred you to this page may have been issued by an organization with

Add to Reading List

Source URL: certificaat.kpn.com

Language: English - Date: 2016-06-28 10:00:02
80Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Revocation list / Public key certificate / X.509 / Kek

Microsoft Word - KEK-GRID-CPCPSdoc

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2010-11-01 03:21:36
UPDATE