Search Results for "Royal Holloway Information Security seriesstart=10start=10start=10"
-
Towards an Autonomous Vehicle Enabled Society: Cyber Attacks and Countermeasures
Sponsored by: TechTarget ComputerWeekly.comCyber-attacks against autonomous vehicles could have grave implications for safety, privacy, reputation of manufacturers, and public perception.
-
Understanding behavioural detection of antivirus
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
-
A case study in critical infrastructure interdependency
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series provides a short introduction to Critical Infrastructure Protection.
-
Enterprise cloud applications – can we trust them?
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
-
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
-
Managing Android devices in the enterprise
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
-
Policing cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
-
Cloud computing storage key management
Sponsored by: TechTarget ComputerWeekly.comJagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.
-
Innovating with cloud-based electronic health records
Sponsored by: Amazon Web ServicesMigrate your electronic health record to the cloud to transform care through faster innovation at scale.
-
CW Benelux - May 2017: 3D printing on the rise
Sponsored by: TechTarget ComputerWeekly.comIs blockchain the future of your IT department? Is the next Google on the rise? Access the May 2017 issue of CW Benelux to learn about the current state of 3D printing in relation to smart applications, cloud-based ID management for public cloud strategy, how to rally your staff for IT innovation, and more.