Search: security

More Results

Sort by: Relevance | Date
  • virtualisation

    In IT, virtualisation is the process of creating logical computing resources from available physical resources. This is accomplished using virtualisation software to create a layer of abstraction between workloads and the underlying physical...

  • VMworld Europe 2011

    Attend VMworld, the IT Industry’s Leading Virtualisation & Cloud Event

    VMworld 2011 offers more than 115 unique breakout...

  • metadata security

    Metadata security is the body of practices and policies designed to protect an organization from security risks posed by unauthorized access to information contained in the organization’s...

  • Security Visualisation

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. Although this example is based on the output of an automated vulnerability scanner...

  • RSA Security

    RSA Security is a United States-based organization that creates encryption, network and computer security products. Ron Rivest Adi Shamir, and Len Adleman founded RSA as an independent company in 1982. RSA derives...

  • The mainframe is dead, long live the mainframe

    As with Mark Twain, the reports of the death of the mainframe have been exaggerated. From the early 1990s onwards, the mainframe has been portrayed as the dinosaur of computing, being steadily overtaken by more glamorous platforms and newer...

  • secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps. The purpose is...

  • Expect More at IP EXPO on 20th & 21st October

    Visit IP EXPO - the only event to cover all aspects of IT in the enterprise and learn how you can Drive Efficiency, Increase Security, Reduce Costs, and Meet Business Needs.

    You can expect:

    • Over...

    • Security issues in Vanets

      This article in our Royal Holloway Security Series analyses the security risks of Vehicular ad-hoc networks (Vanets), an important component of intelligent transportation systems.

    • EU Code of Conduct on Data Centres' Energy Efficiency

      The EU Code of Conduct on Data Centres' Energy Efficiency is a voluntary initiative aimed at reducing the environmental, economic, and energy-supply security impact of today's data centres.

Search Again: