Sciweavers

299 search results - page 20 / 60
» Re-engineering enterprise security
Sort
View
SASO
2010
IEEE
13 years 7 months ago
VCAE: A Virtualization and Consolidation Analysis Engine for Large Scale Data Centers
Server consolidation through virtualization is becoming an effective way to save power and space in enterprise data centers. However, it also brings additional operational risks f...
Haifeng Chen, Hui Kang, Guofei Jiang, Kenji Yoshih...
SIGCOMM
2010
ACM
13 years 10 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
CHIMIT
2009
ACM
14 years 4 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
AUSFORENSICS
2003
13 years 11 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis

Book
310views
15 years 5 months ago
Mastering Enterprise JavaBeans Third Edition
"Published in January 2005, the best-selling book Mastering EJB is now in its third edition and has been updated for EJB2.1 and also features new chapters on security and Web ...
Ed Roman, Rima Patel Sriganesh, and Gerald Brose