Storage security

Results: 1909



#Item
31Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:00
32Computing / Data security / Anomaly detection / Data mining / Computer programming / Cloud computing / Cloud storage / Tracing / Data lineage / CELAR

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-12 08:36:52
33Cryptography / Key management / Zeroisation / Encryption / Password / USB / Key / Disk encryption

Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2015-03-09 11:24:03
34Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
35Computing / Computer data storage / Telecommunications engineering / Data management / Fibre Channel / XAM / Storage area networks / Network protocols / Storage security / ISO/IEC 27040

STORAGE NETWORKING STANDARDS Management and Administration Building a Working Knowledge of Storage Networking Operations through a clear understanding of Solutions & Technology For professionals who are implementing and

Add to Reading List

Source URL: www.sniaindia.org

Language: English - Date: 2012-04-10 08:25:35
36Computing / Internet / Internet Standards / Internet protocols / Software / Domain name system / Network management / System administration / Syslog / Domain Name System Security Extensions / Extensible Storage Engine / Name server

dnstap: high speed DNS logging without packet capture Robert Edmonds () Farsight Security, Inc.

Add to Reading List

Source URL: dnstap.info

Language: English - Date: 2016-04-21 21:16:33
37Distributed data storage / Computing / BitTorrent / Concurrent computing / Distributed computing / File sharing / Distributed hash table / Computer networking / Kademlia / Vuze / Chord / Pastry

IET Information Security Research Article Hijacking the Vuze BitTorrent network: all your hop are belong to us

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:38
38Computing / Cloud computing / Cloud infrastructure / Cloud storage / Data security / Security / Storage security / OpenStack / File hosting service / Public-key cryptography / Computer data storage / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-23 09:05:36
39Energy / Physical universe / Nature / Energy conversion / Renewable energy / Heating /  ventilating /  and air conditioning / Cogeneration / Fuel gas / Natural gas / Energy storage / Data center / Distributed generation

Guidelines on House Bill 1864 ENERGY SECURITY TECHNOLOGIES FOR CRITICAL GOVERNMENTAL FACILITIES HB 1864 was passed by Senate on May 22nd 2013 as an amendment of HBThe bill requires all critical governmental facili

Add to Reading List

Source URL: www.seco.cpa.state.tx.us

Language: English - Date: 2016-01-27 16:50:41
40Computing / Cloud computing / Computer security / Cloud infrastructure / Cloud storage / Data security / Cloud computing security / Information security / Cloud Security Alliance / Data center / Cloud computing issues / Crypto cloud computing

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-17 07:58:59
UPDATE