Skip to main content

Home/ CSIA 459/ Group items tagged annotated

Rss Feed Group items tagged

Phil Kemp

[Short Paper] Understanding the user experience of secure - 1 views

  •  
    Source 1 of 5 for my Annotated bibliography. I know we don't have to post anymore, but figured I would incase someone else may want to read, or gather information.
Phil Kemp

Cell Phone-Based Biometric Identification - 0 views

  •  
    Source 4 of 5 for my Annotated Bibliography on the implementation of biometrics to secure smart phone technologies
Phil Kemp

ENTERPRISES HAVE SMART-PHONE BIOMETRIC OPTIONS: Facial recognition, fingerprint identi... - 0 views

  •  
    Source 3 of 5 for my Annotated Bibliography on the implementation fo biometrics to secure smart phone technologies.
Phil Kemp

Exploring Touch-screen Biometrics for User Identification on Smart Phones - 0 views

  •  
    Source 2 of 5 for my Annotated Bibliography on the implementation of biometrics to secure smart phone technologies.
Alvin Thomas

4 of 4 - 0 views

  •  
    This is 4 of 4 of my sources for annotated bibliography.
Brandon Kennedy

Honeypot Annotated Bibliography - 0 views

Alvin Thomas

3 of 4 - 0 views

  •  
    This is 3 of 4 of my sources for annotated bibliography.
Alvin Thomas

2 of 4 - 0 views

  •  
    This is 2 of 4 of my sources for annotated bibliography.
Gilbert Rivera

Secure, Dependable and High Performance Cloud Storage. - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography The authors in the document provide technical details on securing data on the cloud. It shows guides system administrators on the use of Access Control Lists (ACLs), program scripting, and how to implement several methodologies and techniques to maintain a high level of security of data in the cloud. This is a very technical report but is helpful to show insight on how system administrators maintain a secure backbone in the cloud.
Gilbert Rivera

Data Migration from Grid to Cloud Computing - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this document the authors shows us the migration that business are taking from handling data from their grid to using cloud data storage services. This document focuses on how to use database libraries with data stored in the cloud. It provides guidance in using tools like SQL, Hadoop and HBase mapping. This item can be useful for business to access their databases from information stored in the cloud and can be very helpful.
Gilbert Rivera

Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Gilbert Rivera

Privacy Preserving Approaches in Cloud: a Survey - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography As the authors note, this paper analyses and discusses various methods like adopting cryptographic methods, writing access rights and policies, segregating or fragmenting and then reconstructing the data, etc. All these approaches would preserve the privacy of user and data and while performing public auditing on the cloud. This survey is quite useful because it shows information in several security methodologies involving cloud computing and data storage. It provides with several approaches to the auditing of these systems and ensuring that data stored is secured.
Gilbert Rivera

A Journey from floppy disk to cloud storage - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography The author of this article discusses the evolution of data storage from floppy disks to the new cloud data storage. This is a quite informative item which shows us the first data storage hardware and backup stores, and how it evolved through time and also its contribution on the world of networking. It also describes cloud data storage, how it works and the future of cloud computing in networking.
Gilbert Rivera

EBSCOhost: Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Jessica Riedel

Annotated Bibliograhpy Sources - 2 views

http://www.pewinternet.org/Reports/2012/Privacy-management-on-social-media/Summary-of-findings.aspx http://books.google.com/books?id=lX50qh2WRKoC&pg=PA146&dq=social+media+AND+privacy&hl=en&sa=X&ei...

bibliography annotated

started by Jessica Riedel on 04 Jul 13 no follow-up yet
Ken Ripley

ARE THE ELECTROMAGNETIC FIELDS A DANGER TO THE PUBLIC HEALTH? - 0 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Ken Ripley

Malware goes mobile - 1 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Ken Ripley

Danger, Will Robinson, danger!! - 1 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Ken Ripley

Your cell phone is spying on you - 2 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
  •  
    Ken, This was a very good article. Nothing that I had not heard in the recent couple years, but you can see how society is being tracked to the point that no civil liberties union will be able to do anything anymore. The byproducts of the features that everyone wants, i.e. for convenience, are what allow these agencies monitoring and mining all of this data, with our silent approval. The use of this data will only continue to rise, and we will soon see if the secure state we are building will do more good than bad.
Kerry Tam

Symbian 'vulnerability' and mobile threats - 0 views

  •  
    A study I found at UMUC's library how mobile OS are attacked by hackers and what methods they use to access OS
1 - 20 of 76 Next › Last »
Showing 20 items per page