Access Authentication

Results: 2034



#Item
731Login / Hong Kong Institute of Certified Public Accountants / Computer security / Accountant / Transaction authentication number / Security / Password / Access control

Hong Kong Institute of Certified Public Accountants About Member/International Affiliate Login Account ............................... 2 How to activate Member/International Affiliate Login Account .....................

Add to Reading List

Source URL: www.hkicpa.org.hk

Language: English - Date: 2010-12-13 22:28:28
732Access control / Computer security / Identity management / Network performance / Security / Computer networking / Computing

SANGFOR® Internet Access Management (IAM) Product Features User Authentication and Management Traffic Identification and Categorization Mapping and

Add to Reading List

Source URL: www.sangfor.com

Language: English - Date: 2014-09-20 08:54:22
733Speaker recognition / Keystroke dynamics / Authentication / Password / Multi-factor authentication / Challenge-response authentication / One-time password / Finger vein recognition / Biometrics Institute / Security / Biometrics / Access control

Myths and Misunderstandings about Speaker Authentication A white paper by Dr. Judith A. Markowitz, president J. Markowitz, Consultants Introduction Speaker authentication is a biometric technology that uses the acoustic

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:54
734Authentication / Notary / Packaging / Counterfeit / International Hologram Manufacturers Association / Holography / Technology / Optics / Security / Access control

ASPA to represent Asia on IHMA’s Board, continues expansion momentum January 19, 2014, New Delhi: The prestigious International Hologram Manufacturers Association’s (IHMA) board has appointed two members of the Authe

Add to Reading List

Source URL: aspaglobal.com

Language: English - Date: 2015-01-20 06:03:47
735Federated identity / Identity management / Single sign-on / Two-factor authentication / Password / Smart card / National Health Service / Password manager / Password fatigue / Computer security / Security / Access control

Microsoft Word - B-Healthcare-39A251LU05.doc

Add to Reading List

Source URL: www.evidian.com

Language: English - Date: 2014-07-11 08:36:47
736Surveillance / Two-factor authentication / Multi-factor authentication / PerSay / Nuance Communications / Keystroke dynamics / Iris recognition / CBEFF / Biometrics Institute / Biometrics / Security / Access control

CONFIDENTIAL Monitoring Report – February, 2007 J. Markowitz, Consultants Program A: Competitive Landscape and Standards Activities This report is confidential and intended for registered JMC clients only Competitive L

Add to Reading List

Source URL: www.jmarkowitz.com

Language: English - Date: 2010-06-09 15:30:53
737RSBAC / Linux kernel / Unix / Grsecurity / Kernel / Access control list / Loadable kernel module / FIFO / Tar / System software / Computer architecture / Software

Rule Set Based Access Control (RSBAC) Securing Linux from the Inside Contents II: 4 Selection of Implemented Models 4.1 Authentication Enforcement (AUTH)

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
738HTTP / Internet Information Services / Password / Integrated Windows Authentication / Basic access authentication / MSDE / Relational database management systems / SQL injection / Privileged password management / Software / Computing / Microsoft Windows

Securing and Configuring Advanced Defect Tracking Web Edition Introduction Advanced Defect Tracking contains two levels of security that you should be concerned with: MSDE/SQL Server, and the configuration of Internet I

Add to Reading List

Source URL: www.borderwave.com

Language: English - Date: 2004-03-31 17:04:56
739McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
740EAuthentication / Login / User / Authentication / Security / Access control / Password

Creating a new eAuthentication Account

Add to Reading List

Source URL: gacc.nifc.gov

Language: English - Date: 2014-12-11 10:38:00
UPDATE