IT 와 Social 이야기/Security419 [IBM Security Systems] 5 Easy Steps to Securing Workloads on Public Clouds 5 Easy Steps to Securing Workloads on Public Clouds from IBM Security Systems 2014. 7. 8. [Gerardo Pardo-Castellote] DDS Security Specification (Adopted Beta 1 June 2014) DDS Security Specification (Adopted Beta1 June 2014) from Gerardo Pardo-Castellote 2014. 7. 7. [US-CERT: Bulletin(SB14-181)] 2014년 6월 23일까지 발표된 보안 취약점 원본기사확인하기: [US-CERT: Bulletin(SB14-181)] 2014년 6월 23일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they hav.. 2014. 7. 1. [펜타시스템테크놀러지 고등기술연구소] 빅데이터 기술을 적용한 차세대 보안 핵심 신기술의 최적 적용 및 활용 방안 빅데이터 기술을 적용한_차세대_보안핵심_신기술의_최적_적용_및_활용방안(배포)-d_han_kim-2014-2-20 from Donghan Kim 2014. 6. 27. 이전 1 ··· 60 61 62 63 64 65 66 ··· 105 다음