Infrastructure security

Results: 6100



#Item
81Computing / Software development process / Cloud infrastructure / Agile software development / DevOps / Information technology management / Webroot / To The New / Cloud computing / Software testing / DevOps toolchain

Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

Add to Reading List

Source URL: www.kovarus.com

Language: English - Date: 2016-07-11 19:38:57
82Computing / Network architecture / Computer architecture / Cyberwarfare / Computer network security / Data security / IP multicast / Overlay network / Denial-of-service attack / Anycast / Database trigger / Firewall

Towards a More Functional and Secure Network Infrastructure Daniel Adkins Karthik Lakshminarayanan Adrian Perrig Ion Stoica UC Berkeley UC Berkeley CMU

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2003-06-05 12:41:23
83Cryptography / Public key infrastructure / Email authentication / Public-key cryptography / Cryptographic software / Email encryption / Encryption / Email client / Email / Cipher / Draft:GoldBug / Email privacy

Email security for counsellors With the increasing use of online counselling within student counselling services, preserving confidentiality is a major concern. Stephen Allsopp explains how sending an email is the equiva

Add to Reading List

Source URL: bacpuc.org.uk

Language: English - Date: 2016-02-25 06:22:14
84Cryptography / Public key infrastructure / Key management / Public-key cryptography / Transport Layer Security / E-commerce / GlobalSign / Extended Validation Certificate / Certificate authority / Certificate policy / Certification Practice Statement / CA/Browser Forum

GlobalSign CA Certification Practice Statement Date: 2nd May 2016 Version: v8.1

Add to Reading List

Source URL: jp.globalsign.com

Language: English - Date: 2016-05-26 21:37:36
85Security / Cyberwarfare / Computing / Public-key cryptography / Resource Public Key Infrastructure / Cryptography / Netnod / Computer security / Vulnerability

Inter-­‐domain  rou.ng  security   Stocktaking,  state-­‐of-­‐the  art,  and   future  perspec.ves   IEPG,  IETF  78,  Maastricht,  The  Netherlands  

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2010-07-25 05:37:06
86Computing / Cloud computing / Cloud infrastructure / Cloud computing security / OpenStack / Elasticity / VMware / Google Compute Engine / Cloud computing issues / IBM cloud computing

The State of Public Infrastructure-as-a-Service Cloud Security WEI HUANG, AFSHAR GANJALI, BEOM HEYN KIM, SUKWON OH, and DAVID LIE, University of Toronto The public Infrastructure-as-a-Service (IaaS) cloud industry has re

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2015-07-17 13:25:27
87Computing / Technology / Security / Working groups / Infrastructure / United States Department of Homeland Security / National security / Rseaux IP Europens Network Coordination Centre / Critical infrastructure protection / RIPE / Critical infrastructure / Autonomous system

Discovery and Mapping of the Dutch National Critical IP Infrastructure Research Project 2 Fahimeh Alizadeh, Razvan C. Oprea Supervised by:

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2013-08-11 17:29:57
88Cryptography / Public-key cryptography / Public key infrastructure / Key management / Transport Layer Security / Cryptographic protocols / Certificate policy / Certificate authority / Public key certificate / Revocation list / X.509 / Kek

Microsoft Word - KEK-GRID-CPCPSdoc

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2010-11-01 03:18:34
89Cryptography / Public-key cryptography / Key management / Public key infrastructure / Computer access control / E-commerce / One-time password / Certificate authority / Internet Explorer / Public key certificate / Password / Security and safety features new to Windows Vista

FAQs: Digital Certificate Service    

Add to Reading List

Source URL: myexostar.com

Language: English - Date: 2016-06-17 15:09:11
90United States Department of Homeland Security / Government / United States intelligence agencies / National security / Safety / Infrastructure / Security engineering / Cyberwarfare / Critical infrastructure protection / United States Computer Emergency Readiness Team / DHS Office of Intelligence and Analysis / Risk management

Regional Overview of Critical Infrastructure Programs: Region Snapshots May 2016 i Introduction:

Add to Reading List

Source URL: rtriplec.files.wordpress.com

Language: English - Date: 2016-05-19 16:45:07
UPDATE