Secure Outsourced Computation in a Multi-Tenant Cloud. Seny Kamara - Microsoft Research Mariana Raykova - Columbia
|
|
|
- Darlene Todd
- 10 years ago
- Views:
Transcription
1 Secure Outsurced Cmputatin in a Multi-Tenant Clud Seny Kamara - Micrsft Research Mariana Raykva - Clumbia
2 Outsurced Cmputatin (x, f ) f (x) IBM WCSC 2
3 The Clud IBM WCSC 3
4 Virtualized Servers App1 App2 App App OS OS Hypervisr Hardware OS IBM WCSC 4
5 Multi-Tenancy Virtualizatin enables multi-tenancy VMs frm different clients run n the same server Multi-tenancy allws clud peratr t Optimize resurces usage This all leads t $ saved fr clients App1 App2 App App OS Hypervisr Hardware OS OS IBM WCSC 5
6 Multi-Tenancy Multi-tenancy is indispensible t clud cmputing This is where part f the ecnmic incentives cme frm but it intrduces security cncerns What if a c-lcated VM attacks my VM? Current slutin is VM islatin VMs cannt see each ther s memry r state Resurces are apprpriately shared App1 App2 App OS OS Hypervisr Hardware IBM WCSC 6
7 Breaking Islatin Expliting the hypervisr Sme attacks knwn against VMware s ESX, XBOX s hypervisr, Bypassing the hypervisr [Ristenpart et al. 09] shw that crss VM side-channels are pssible Cnclusin frm [Ristenpart et al. 09]: If security is a cncern, use a single-tenant server. IBM WCSC 7
8 Hw d we Prtect vs. Multi-Tenancy? App1 App2 App OS OS Hypervisr Hardware VM Islatin vulnerabilities side-channels Cryptgraphy strng security Single-Tenancy Perfectly secure IBM WCSC 8
9 Outline Mtivatin Secure utsurced cmputatin in a multi-tenant clud Delegatin prtcls Security definitin in ideal/real wrld paradigm General-purpse delegatin prtcl Secret sharing & MPC Limitatins f ur apprach IBM WCSC 9
10 A Pssible Apprach (EncK(x), f ) EncK ( f (x) ) Verifiable cmputatin [Gentry-Gennar-Parn, Chung-Kalai-Vadhan] Fully-Hmmrphic Encryptin (xʼ, f ) [Gentry, ] f (x), π IBM WCSC 10
11 FHE + VC Efficiency FHE is nt practical VC is based n FHE Overkill Interactin is OK Clud is nt a single-server envirnment IBM WCSC 11
12 Delegatin Prtcl Prtcl between C: the client wh prvides an input VM 1,,VM w : VM wrkers wh have n input but return an utput X IBM WCSC 12
13 Underlying Assumptin Crss VM attacks always wrk Semi-hnest: if A c-lcates a VM then it recvers client VM s state Malicius: if A c-lcates a VM then it cntrls client VM Wrst-case assumptin Makes ur results strnger Captures cncerns f highly sensitive clients (e.g., gvernments) Nt essential t ur mdel prbability f successful crss VM attack can be taken int accunt IBM WCSC 13
14 Security Definitin Ideal/real wrld paradigm frm MPC [,Canetti01] Real executin: C and VMs run the real prtcl in presence f A that can c-lcate adversarial VMs Ideal executin: C sends input t trusted party wh returns f(x) in presence f A that can c-lcate adversarial VMs Security: every A in the real wrld can be emulated by an A in the ideal wrld Nte: If A is malicius then it is allwed t abrt during the executins Guarantees: As lng as A c-lcates at mst (w - 1) adversarial VMs Privacy: A learns n infrmatin abut C s input r utput Crrectness: C receives crrect utput IBM WCSC 14
15 Multi-Party Cmputatin x f (x,y,z) y 80 s: [Ya, Gldreich-Micali- Wigdersn, ] z Tday: [Mhassel-Franklin, Lindell- Pinkas, Klesnikv-Sadeghi- Schnedier, ] IBM WCSC 15
16 Secret Sharing [Shamir]? IBM WCSC 16
17 A General-Purpse Prtcl The apprach Split input x int w shares (s 1,,s n ) Stre each share in a separate VM Make the VMs evaluate F using MPC F(s 1,,s n ; r 1 r n ): recvers the input x frm the shares Evaluates y = f(x) Use r 1 r n t generate w shares f y Output a share f y t each VM VMs send back their shares t C wh recvers y IBM WCSC 17
18 Intuitin Secret sharing A must crrupt each wrker MPC Enables VMs t securely cmpute n shared input Withut revealing infrmatin abut shares t ther wrkers Prevents A frm learning abut 2+ shares with a single crruptin Cin Tssing Cins will be unifrm as lng as at least ne wrker is uncrrupted Guarantees sharing f utput is secure Delegatin is secure vs. malicius A if MPC is IBM WCSC 18
19 Limitatins f Delegatin Prtcls Efficiency Overhead fr recver & share Overhead fr MPC [+ ZKPs/C&C if A is malicius] Cst Requires an extra (n 1) VMs Useful if cst f prtcl < cst f single-tenant server Onging wrk Efficient delegatin prtcls fr specific functinalities (e.g., plynmials) Cmbining ur apprach with ther techniques IBM WCSC 19
20 Questins? IBM WCSC 20
UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments
Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4
Licensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
Licensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition
State f Wiscnsin DET Agency Managed Virtual Services Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 6/03/08 1.0 James Sylla Initial draft 9/21/11 1.7 Amy Dustin Annual review
Data Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
Security in Business and Applications. Madison Hajeb Stefan Hurst Benjamin Von Slade
Security in Business and Applicatins Madisn Hajeb Stefan Hurst Benjamin Vn Slade Intrductin Prject Cncept - Implement security in a small business setting Original Plan - D sme security audits fr small
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
Securely Managing Cryptographic Keys used within a Cloud Environment
Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta [email protected] 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin
2. When logging is used, which severity level indicates that a device is unusable?
Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages
Data Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
Process Automation With VMware
Prcess Autmatin With VMware Intelligent Service Autmatin fr Real and Virtual Envirnments Intrductin This Whitepaper describes hw the UC4 platfrm integrates with the VMware vsphere Server and the VMware
White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents
Level 1 Technical RealPresence Web Suite and Web Suite Pr Cntents 1 - Glssary... 2 2 Features... 3 RealPresence Platfrm integratin... 3 RealPresence Web Suite Sftware... 3 Sftware Keys... 3 3 - Web Client
CHECKING ACCOUNTS AND ATM TRANSACTIONS
1 Grades 6-8 Lessn 1 CHECKING ACCOUNTS AND ATM TRANSACTIONS Tpic t Teach: This lessn is intended fr middle schl students in sixth thrugh eighth grades during a frty minute time perid. The lessn teaches
Interactive Catchment Plan Project Brief. Background to the organisation. How will we achieve this? What is a rivers trust?
Interactive Catchment Plan Prject Brief Backgrund t the rganisatin The Suth East Rivers Trust is an envirnmental charity dedicated t the cnservatin and restratin f rivers in the suth east f England, including
Towards Novel Certification Models in Cloud Infrastructures (the CUMULUS approach)
Twards Nvel Certificatin Mdels in Clud Infrastructures (the CUMULUS apprach) Prfessr G. Spanudakis Schl f Infrmatics CSP Frum, 18-19 April 2013, Brussels Outline Clud Security Still a prblem? Prvider perspective
Microsoft Exchange 2010 on VMware Design and Sizing Examples
Micrsft Exchange 2010 n VMware Micrsft Exchange 2010 n VMware This prduct is prtected by U.S. and internatinal cpyright and intellectual prperty laws. This prduct is cvered by ne r mre patents listed at
Electronic Data Interchange (EDI) Requirements
Electrnic Data Interchange (EDI) Requirements 1.0 Overview 1.1 EDI Definitin 1.2 General Infrmatin 1.3 Third Party Prviders 1.4 EDI Purchase Order (850) 1.5 EDI PO Change Request (860) 1.6 Advance Shipment
Copernicus & Big Data: A Perspective from the European EO Services Industry. Geoff Sawyer: EARSC Secretary General
Cpernicus & Big Data: A Perspective frm the Eurpean EO Services Industry. Geff Sawyer: EARSC Secretary General What is EARSC? EARSC is a trade assciatin (NPO), funded in 1989, which represents cmpanies:
Session 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
Enterprise Content Management Solutions. R. Gregory Tschida Chief Information Officer MN.IT Services @ Minnesota Department of Revenue
Enterprise Cntent Management Slutins R. Gregry Tschida Chief Infrmatin Officer MN.IT Services @ Minnesta Department f Revenue 1 What is Enterprise Cntent Management (ECM)? Enterprise Cntent Management
How Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
India vs. China The Outsourcing War
Flexsin Technlgies (P) Limited India vs. China The Outsurcing War The glbal utsurcing market has evlved ver the years and has redefined the apprach f ding business. The utsurcing vendrs are prviding strategic
Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
Fermilab Time & Labor Desktop Computer Requirements
Fermilab Time & Labr Desktp Cmputer Requirements Fermilab s new electrnic time and labr reprting (FTL) system utilizes the Wrkfrce Central prduct frm Krns. This system is accessed using a web brwser utilizing
In addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
SBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
Often people have questions about new or enhanced services. This is a list of commonly asked questions and answers regarding our new WebMail format.
Municipal Service Cmmissin Gerald P. Cle Frederick C. DeLisle Thmas M. Kaul Gregry L. Riggle Stanley A. Rutkwski Electric, Steam, Water Cable Televisin and High Speed Internet Service since 1889 Melanie
State of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)
Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an
Information Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
Using Sentry-go Enterprise/ASPX for Sentry-go Quick & Plus! monitors
Using Sentry-g Enterprise/ASPX fr Sentry-g Quick & Plus! mnitrs 3Ds (UK) Limited, February, 2014 http://www.sentry-g.cm Be Practive, Nt Reactive! Intrductin Sentry-g Enterprise Reprting is a self-cntained
Cloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
A Walk on the Human Performance Side Part I
A Walk n the Human Perfrmance Side Part I Perfrmance Architects have a license t snp. We are in the business f supprting ur client rganizatins in their quest fr results that meet r exceed gals. We accmplish
NAVIPLAN PREMIUM LEARNING GUIDE. Existing insurance coverage
NAVIPLAN PREMIUM LEARNING GUIDE Existing insurance cverage Cntents Existing insurance cverage 1 Learning bjectives 1 NaviPlan planning stages 1 Client case 2 Enter yur clients existing life, disability,
FAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE
TOWARDS OF AN INFORMATION SERVICE TO EDUCATIONAL LEADERSHIPS: BUSINESS INTELLIGENCE AS ANALYTICAL ENGINE OF SERVICE A N D R E I A F E R R E I R A, A N T Ó N I O C A S T R O, D E L F I N A S Á S O A R E
990 e-postcard FAQ. Is there a charge to file form 990-N (e-postcard)? No, the e-postcard system is completely free.
990 e-pstcard FAQ Fr frequently asked questins abut filing the e-pstcard that are nt listed belw, brwse the FAQ at http://epstcard.frm990.rg/frmtsfaq.asp# (cpy and paste this link t yur brwser). General
NextGenJustice Florida attorneys have prepared the following Frequently Asked Questions to help you with your uncontested divorce.
NextGenJustice Flrida attrneys have prepared the fllwing Frequently Asked Questins t help yu with yur uncntested divrce. Frequently asked questins abut yur uncntested Flrida divrce: Q. Hw lng will my divrce
Personal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
366 Degrees Gaining Extra Degrees of Success
366 Degrees Gaining Extra Degrees f Success In the rush t gain new custmers, cmpanies ften verlk their best custmers the nes they already have. While finding and attracting new custmers is certainly fundamental
Customers FAQs for Webroot SecureAnywhere Identity Shield
Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt
Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3
EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.
RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au
RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline
Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC
Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device
INTEGRATION OVERVIEW. Introduction... 1. Authentication methods... 2. Learning management system (LMS) integration methods... 2. AICC standard...
INTEGRATION OVERVIEW Cntents Intrductin... 1 Authenticatin methds... 2 Learning management system (LMS) integratin methds... 2 AICC standard... 2 LTI standard... 3 Applicatin prgramming interface (API)
How To Use Citrix Xendesktp 4 With Flexcast
Citrix XenDesktp 4: The clear chice fr desktp virtualizatin Citrix pineered desktp and applicatin delivery ver 20 years ag, and in recent years, we have been rapidly innvating with ur industry leading
IN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003
Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a
Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
PROCESSING THROUGH MPS and AVIMARK
Befre using McAllister Payment Slutins (MPS) as yur pint-f-sale and/r integrated credit card prcess slutin, the McAllister Payment Slutins PA- DSS Implementatin Guide must be reviewed in its entirety.
Exercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
The 3Dnet Cloud - are you connected yet?
The 3Dnet Clud - are yu cnnected yet? 3DnetMedical is a clud-based service that prvides easy, timely access t studies nline. Fllwing IHE standards, any imaging setup can easily be cupled t the clud. Image
Some Statistical Procedures and Functions with Excel
Sme Statistical Prcedures and Functins with Excel Intrductry Nte: Micrsft s Excel spreadsheet prvides bth statistical prcedures and statistical functins. The prcedures are accessed by clicking n Tls in
Network Security Trends in the Era of Cloud and Mobile Computing
Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager
Software as a Service. Haojie Hang Ogheneovo Dibie
Sftware as a Service Hajie Hang Oghenev Dibie Executive Summary In this presentatin, we g thrugh the Sftware as a Service Methdlgy, examine its benefits and drawbacks and talk abut tw state-f-art SaaS
Microsoft has released Windows 8.1, a free upgrade to Windows 8. Follow the steps below to upgrade to Windows 8.1.
Fr VAIO PC users running Windws 8 Micrsft has released Windws 8.1, a free upgrade t Windws 8. Fllw the steps belw t upgrade t Windws 8.1. Prepare t Upgrade Befre yu upgrade: Windws 8 users If yu re already
Copyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.com/ We have attempted to make these documents complete, accurate, and
ii Cpyright 2013, SafeNet, Inc. All rights reserved. http://www.safenet-inc.cm/ We have attempted t make these dcuments cmplete, accurate, and useful, but we cannt guarantee them t be perfect. When we
This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.
Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an
Gateway Agent - First Amendment to the High Level Design Document
Gateway Agent - First Amendment t the High Level Design Dcument Scpe The Gateway Agent HLD thrugh update 1 assumes that nly the Cntrl App, while cnnected t the prximal netwrk, can initiate new clud services.
Microsoft SQL Server Administration
Micrsft SQL Server Administratin Disk & memry David Hksza http://siret.cz/hksza Lecture Outline Query lifecycle Data strage SQL Server Memry SELECT Query Lifecycle 1. SNI client-server cnnectin using TCP/IP
AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy
AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,
Service Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
E-Commerce-SWOT Analysis
Internatinal Jurnal f Management and Cmmerce Innvatins ISSN 2348-7585 (Online) Vl. 2, Issue 1, pp: (226-231), Mnth: April 2014 - September 2014, Available at: www.researchpublish.cm E-Cmmerce-SWOT Analysis
Personal Selling. Lesson 22. 22.1 Objectives. 22.2 Meaning of Personal Selling
Persnal Selling Lessn 22 Persnal Selling When yu want t buy smething yu usually g t a cncerned shp and purchase it frm there. But, smetimes yu find peple bring certain gds r prducts and make them available
WEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
1)What hardware is available for installing/configuring MOSS 2010?
1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin
