Trend Micro Deep Security VMware Global Technology Alliance Partner Changing the Game with Agentless Security for the Virtual Data Center

ثبت نشده
چکیده

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

The Impact of Conflict on Immunisation Coverage in 16 Countries

Background Military conflict has been an ongoing determinant of inequitable immunisation coverage in many low- and middle-income countries, yet the impact of conflict on the attainment of global health goals has not been fully addressed. This review will describe and analyse the association between conflict, immunisation coverage and vaccine-preventable disease (VPD) outbreaks, along with...

متن کامل

Food Security and Land Use Change under Conditions of Climatic Variability

Food security covers aspects at all spatial levels from local to global and from an interdisciplinary and systemic food systems perspective. This book aims to better understand environmental, nutritional, agricultural, demographic, socioeconomic, political, technological, and institutional drivers, costs, and outcomes of current and future food security. Interactions with contextual factors inc...

متن کامل

An Architecture for Security and Protection of Big Data

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012