API Security

Results: 194



#Item
21

SecretAgent® DAS 1.7 HSM Proxy Architecture Diagram Copyright© Information Security Corp. All rights reserved. HSM’s PKCS#11 API HSM

Add to Reading List

Source URL: www.infoseccorp.com.

- Date: 2008-04-30 20:01:00
    22Shjo manga / Crest of the Royal Family / Egyptian mythology in popular culture / Yamato Transport

    Web APIの活用による システムのモダナイズとマネタイズ CA API Management (Formerly CA Layer 7) Director, Solution Sales Security and API Management

    Add to Reading List

    Source URL: gartner-em.jp

    Language: English - Date: 2016-05-04 00:29:44
    23Cryptography / Security / Computer security / Computer access control / Authenticator / Nok Nok Labs / Authentication / FIDO Alliance / Fido

    FIDO UAF Authenticator-Specific Module API FIDO Alliance Proposed Standard 08 December 2014 This version: https://fidoalliance.org/specs/fido-uaf-v1.0-ps/fido-uaf-asm-api-v1.0pshtml Previous versio

    Add to Reading List

    Source URL: fidoalliance.org

    Language: English - Date: 2015-03-30 14:07:07
    24Web services / Identity management / Computer access control / Web Services Description Language / Security Assertion Markup Language / SOAP / WS-Security / WS-Addressing / SAML 1.1 / SAML-based products and services / GSOAP

    SERVICE and API EMULATION CloudPort is an easy-to-configure, comprehensive service emulation product for mimicking service APIs as a virtual endpoint or ESB broker that can be communicated Easy to Deploy

    Add to Reading List

    Source URL: www.crosschecknet.com

    Language: English - Date: 2012-10-09 22:39:20
    25Computing / Internet / Network architecture / Network protocols / BID / Transport Layer Security / Comparison of data serialization formats

    Netfonds Bank AS API Gateway Version 1.3 Pia Jakobsen 

    Add to Reading List

    Source URL: www.netfonds.no

    Language: English
    26Computer security / Cryptography / Computer access control / Cybercrime / Social engineering / Cloud standards / Hypertext Transfer Protocol / Phishing / Password / Cross-site scripting / OpenID / Multi-factor authentication

    PhishSafe: Leveraging Modern JavaScript API’s for Transparent and Robust Protection Bastian Braun Martin Johns

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English
    27

    Analysis of the IBM CCA Security API Protocols in Maude-NPA Antonio Gonz´alez-Burgue˜ no1 Sonia Santiago1 1 Santiago Escobar

    Add to Reading List

    Source URL: ssr2015.com

    Language: English - Date: 2015-06-22 06:35:56
      28

      ThreatScape® API Integrated Actionable Intelligence ThreatScape® API enables you to integrate the worlds best cyber threat intelligence, into your existing security

      Add to Reading List

      Source URL: www.isightpartners.com

      Language: English - Date: 2015-01-26 00:35:23
        29

        This Organization Participates in E-Verify  This employer will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland

        Add to Reading List

        Source URL: www.teledyne-api.com

        Language: English - Date: 2014-10-08 13:42:54
          30

          Energy Security Committee/NASEO ASERTTI Energy Policy & Technology Outlook Conference Thursday, February 9, 2012; 2:30-4:30 pm EST Participants API - Patrick Kelly Department of the Army Bob Boonstoppel and Cynthia Jeste

          Add to Reading List

          Source URL: www.naseo.org

          Language: English - Date: 2013-04-26 10:38:30
            UPDATE