[ICO]NameLast modifiedSize
[PARENTDIR]Parent Directory  -
[DIR]products/2023-10-13 18:21 -
[DIR]regulations/2023-03-11 16:28 -
[DIR]software/2023-10-08 14:39 -
[DIR]technologies/2023-08-17 11:41 -
[pdf]Annexure-2_sdc.pdf2023-03-09 15:36 59K
[pdf]DCA-policies-procedures.pdf2023-03-09 16:32 59K
[slideshow]18_DataCenter_Security_Overview.pptx2023-03-09 16:50 140K
[pdf]data-centre-strategy-principles-v100.pdf2023-03-09 17:12 231K
[pdf]12F0010X00-Four-Layers-Data-Center-Security-WP-EN-US.pdf2023-03-09 16:31 328K
[pdf]ICSecurity2.pdf2023-03-09 16:53 380K
[pdf]EBook_2017_Six_critical_attack_vectors_to_detect_in_your_data_center_and_private_cloud_English.pdf2023-03-09 17:06 519K
[pdf]WindowsAzure-SecurityPrivacyCompliance.pdf2023-03-09 17:05 560K
[pdf]oracle-cloud-infrastructure-security-architecture.pdf2023-03-09 17:11 734K
[pdf][Open for Comment] OCP Physical Security White Paper (1).pdf2023-03-09 17:07 885K
[pdf]cs-csps_guidelines_for_small_data_center_v1.1.pdf2023-03-09 16:33 1.0M
[pdf]google-common-security-whitepaper.pdf2023-03-09 16:55 1.0M
[pdf]vertiv-data-center-security-ebook-eb-en-na-sl-70939-web_359098_0.pdf2023-03-09 17:15 1.1M
[pdf]IDC-infographic-hybrid-data-center-top-security-priorities.pdf2023-03-09 16:45 1.2M
[pdf]data-center-strategy-in-the-digital-enterprise-whitepaper.pdf2023-03-09 16:50 1.7M
[pdf]security-for-your-private-data-center-getting-it-right.pdf2023-03-09 16:32 1.7M
[pdf]fff48756c66a70ad900b0f7fb65d7cae20e8204b64faefa17b7b2f7bff0287ab-data-center-security.pdf2023-03-09 17:03 1.7M
[pdf]Sloan-Security-Group-Whitepaper-Data-Center-Perimeter-Seurity-Best-Practices.pdf2023-03-09 17:08 1.9M
[pdf]cpnidata-centre-owners-considerations.pdf2023-03-09 16:54 2.1M
[pdf]Corelight-Zeek-Cheatsheets-3.0.4.pdf2023-10-08 14:35 2.1M
[pdf]cpnidata-centre-users-considerations.pdf2023-03-09 16:54 2.1M
[pdf]sb_data_center_solution_brief.pdf2023-03-09 17:09 2.4M
[pdf]Data Centre White Paper 2022 FINAL.pdf2023-03-09 16:48 8.7M
All data provided herein is for your eyes only, it is covered by copyright and personal data protection laws, and should not be distributed by any means, including printed, verbal or visual presentation.