Virtual private database

Results: 28



#Item
1Architecting for Genomic Data Security and Compliance in AWS Working with Controlled-Access Datasets from dbGaP, GWAS, and other Individual-Level Genomic Research Repositories Angel Pizarro

Architecting for Genomic Data Security and Compliance in AWS Working with Controlled-Access Datasets from dbGaP, GWAS, and other Individual-Level Genomic Research Repositories Angel Pizarro

Add to Reading List

Source URL: d0.awsstatic.com

Language: English - Date: 2014-12-11 13:54:38
2Amazon Web Services – Using AWS for Disaster Recovery  Using Amazon Web Services for Disaster Recovery OctoberGlen Robinson, Attila Narin, and Chris Elleman

Amazon Web Services – Using AWS for Disaster Recovery Using Amazon Web Services for Disaster Recovery OctoberGlen Robinson, Attila Narin, and Chris Elleman

Add to Reading List

Source URL: media.amazonwebservices.com

Language: English - Date: 2014-10-20 16:44:35
3Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security and Availability For the Period April 1, 2015 – September 30, 2015  ©2015 Amazon.com, Inc. or its affiliates

Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security and Availability For the Period April 1, 2015 – September 30, 2015 ©2015 Amazon.com, Inc. or its affiliates

Add to Reading List

Source URL: d0.awsstatic.com

Language: English - Date: 2015-11-16 18:13:30
4Amazon Web Services – Overview of Security Processes  August 2015 Amazon Web Services: Overview of Security Processes August 2015

Amazon Web Services – Overview of Security Processes August 2015 Amazon Web Services: Overview of Security Processes August 2015

Add to Reading List

Source URL: d0.awsstatic.com

Language: English - Date: 2015-11-03 13:56:03
5

PDF Document

Add to Reading List

Source URL: awsmedia.s3.amazonaws.com

Language: English
6Amazon Web Services Overview of Security Processes  Amazon Web Services: Overview of Security Processes MayPlease consult http://aws.amazon.com/security for the latest version of this paper)

Amazon Web Services Overview of Security Processes Amazon Web Services: Overview of Security Processes MayPlease consult http://aws.amazon.com/security for the latest version of this paper)

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2012-06-11 19:13:26
7Database Virtualization The Next Wave of Virtualization Introduction Virtualization has taken the computing world by storm. Server virtualization was the front of the virtualization wave, but we are now seeing a strong

Database Virtualization The Next Wave of Virtualization Introduction Virtualization has taken the computing world by storm. Server virtualization was the front of the virtualization wave, but we are now seeing a strong

Add to Reading List

Source URL: www.scaledb.com

Language: English - Date: 2014-05-15 19:13:01
8Database Virtualization The Next Wave of Virtualization Last Updated: December 12, 2014  © Copyright 2014

Database Virtualization The Next Wave of Virtualization Last Updated: December 12, 2014 © Copyright 2014

Add to Reading List

Source URL: scaledb.com

Language: English - Date: 2014-12-11 18:51:09
9Rackspace Cloud Databases and Container-based virtualization  August 2012 Rackspace Cloud Databases and Container-based Virtualization

Rackspace Cloud Databases and Container-based virtualization August 2012 Rackspace Cloud Databases and Container-based Virtualization

Add to Reading List

Source URL: c1776742.cdn.cloudfiles.rackspacecloud.com

Language: English - Date: 2012-07-30 15:20:50
10Getting Started with Amazon AWS

Getting Started with Amazon AWS

Add to Reading List

Source URL: docs.amazonaws.cn

Language: English - Date: 2015-04-28 16:26:18