Access control

Results: 10445



#Item
171Computer access control / Cryptography / Obfuscation / Identity management / Password / Security / Cybercrime / Crypt / Phishing / Password strength / Password manager

Microsoft Word - Context Sensitive Password.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-29 23:54:55
172Digital media / Technology / Content-control software / Digital rights management / Internet censorship / Internet privacy / DCN / Internet access / Internet

ACCEPTABLE USE AND INTEREST SAFETY POLICY

Add to Reading List

Source URL: www.schodack.k12.ny.us

Language: English
173Computing / Computer access control / Computer security / Identity management systems / Identity management / Federated identity / ForgeRock / Cloud standards / Computer network security / User-Managed Access / Customer engagement / Provisioning

Why Financial Services Choose ForgeRock What We Do IMPROVE CUSTOMER EXPERIENCE

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-08-11 01:02:02
174Prevention / Password / Security / Login / Print job / Access control / Safety

Mobile Printing User Guide

Add to Reading List

Source URL: itsc.hsmc.edu.hk

Language: English - Date: 2016-06-08 02:39:18
175Computer architecture / Software / Web accessibility / Disability / Computing / MacOS / Assistive technology / Educational technology / Accessibility / Mac OS X Snow Leopard / Computer mouse / Radiation Control for Health and Safety Act

The following Voluntary Product Accessibility information refers to the Apple Mac mini. For more information on the accessibility features of Mac OS X and the Mac mini, visit Apple’s accessibility Web site at http://ww

Add to Reading List

Source URL: access.sdsu.edu

Language: English - Date: 2015-03-16 13:00:15
176Computer security / Computer access control / Identity management / Federated identity / Public administration / Open government / Digital identity / Authentication / E-government / National Strategy for Trusted Identities in Cyberspace / Interoperability / EGovernment in Europe

Microsoft Word - SSEDIC Press Release - Talamo _2_.docx

Add to Reading List

Source URL: www.eid-ssedic.eu

Language: English
177

Beetle Sharing, flexibility and access control for Bluetooth Low Energy Amit Levy James Hong Laurynas Riliskis Philip Levis Keith Winstein Stanford University

Add to Reading List

Source URL: amitlevy.com

- Date: 2016-07-08 11:21:37
    178Hypertext Transfer Protocol / Computer access control / Prevention / Computing / Security / Password / Transmission Control Protocol / HTTP cookie / HTTPS / Challengeresponse authentication

    Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II Solutions

    Add to Reading List

    Source URL: css.csail.mit.edu

    Language: English - Date: 2016-01-29 11:50:05
    179Software engineering / Computing / Software architecture / Computer access control / Scripting languages / Cross-platform software / JavaScript / Web programming / Mashup / HTTP cookie / Web API / Same-origin policy

    Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D4.1

    Add to Reading List

    Source URL: websand.eu

    Language: English - Date: 2015-05-06 05:08:51
    180Computing / Message-oriented middleware / Inter-process communication / Computer access control / Internet protocols / Middleware / Advanced Message Queuing Protocol / JSON Web Token / Message queue / Security token / OAuth

    Advanced Message Queuing Protocol (AMQP) Claims-based Security Version 1.0 Working DraftAugust 2013

    Add to Reading List

    Source URL: www.oasis-open.org

    Language: English
    UPDATE