Storage security

Results: 1909



#Item
11

Roberto Guanciale Mads Dam Hamed Nemati Christoph Baumann Cache Storage

Add to Reading List

Source URL: www.ieee-security.org

- Date: 2016-05-23 23:49:50
    12

    National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme CCEVS Position Statement USB Portable Storage Device Essential Security Requirements version 2.0, dated 28 October 2013

    Add to Reading List

    Source URL: www.commoncriteriaportal.org

    - Date: 2014-01-15 13:26:10
      13

      Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribusion Systems with Trade-offs between Communication and Storage Yohei Watanabe and Junji Shikata

      Add to Reading List

      Source URL: security-lab.jaist.ac.jp

      - Date: 2015-11-22 02:25:28
        14Computing / Computer data storage / Telecommunications engineering / Data management / Storage area network / Fibre Channel / XAM / Storage security / ISO/IEC 27040

        STORAGE NETWORKING STANDARDS Management and Administration Building a Working Knowledge of Storage Networking Operations through a clear understanding of Solutions & Technology For professionals who are implementing and

        Add to Reading List

        Source URL: www.snia-sa.org

        Language: English - Date: 2010-10-20 15:16:23
        15Computer storage devices / Computer data storage / Computer hardware / Computer storage media / Information science / Non-volatile memory / Video surveillance / Security / Video management system / NVR / IP camera / Hard disk drive

        Expert In Protecting Your Interests M6 Rackmount Enterprise NVR Series As GVD’s Enterprise NVRs, the M6 Series

        Add to Reading List

        Source URL: www.gvdigital.com

        Language: English - Date: 2016-06-19 23:56:05
        16Computing / Linear Tape-Open / Security / Backup / Data corruption / Computer security / Linear Tape File System / Magnetic tape data storage

        SECURITY The value of data is increasing, but so is the cost of protecting this data. Data stored online is susceptible to compromise and vulnerable to corruption threats. It can be accidental, such as a natural disaster

        Add to Reading List

        Source URL: www.lto.org

        Language: English - Date: 2016-02-18 18:42:59
        17Computing / Software / Online backup services / Cloud storage / Data security / Data synchronization / File hosting / Cloud computing / Dropbox / ShareFile / Password / Google Drive

        CLOUD ADOPTION RISK REPORT Table of Contents INTRODUCTION ........................................................................................................2 SENSITIVE DATA IN THE CLOUD ..........................

        Add to Reading List

        Source URL: info.skyhighnetworks.com

        Language: English - Date: 2016-08-23 00:16:32
        18Security / Computer security / Computing / HackerOne / Cloud storage / Cyberwarfare / OwnCloud / Vulnerability

        owncloud_Case-Study_with_HackerOne_v5

        Add to Reading List

        Source URL: oc.owncloud.com

        Language: English - Date: 2016-07-16 05:34:16
        19Computing / Cloud computing / Cloud storage / Cloud infrastructure / Cloud applications / Outsourcing / Perspecsys / Cloud computing security

        ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

        Add to Reading List

        Source URL: www.ijmetmr.com

        Language: English - Date: 2014-12-12 08:38:14
        20

        Item Title USB Portable Storage Device: Security Problem Definition Summary Reviewer Item Identifier USBiTC-SPD-001 v0.4

        Add to Reading List

        Source URL: www.commoncriteriaportal.org

        - Date: 2014-07-22 15:55:05
          UPDATE