Access control

Results: 10445



#Item
411Internet privacy / Contract law / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Indemnity / Computer security / Computing / World Wide Web / Criticism of Facebook / IO Group /  Inc. v. Veoh Networks /  Inc.

  PLEASE  READ  THESE  TERMS  AND  CONDITIONS  CAREFULLY  BEFORE  USING   THIS  WEBSITE     1.  TERMS  OF  WEBSITE  USE  FOR  WWW.4DELTA.CO.UK  

Add to Reading List

Source URL: www.4delta.co.uk

Language: English - Date: 2016-01-28 11:02:21
412Computer access control / Cryptography / Computer security / Prevention / Password / Security / Login / Authentication / Password strength / Password notification email

Getting started with the ECDC Map Maker - EMMa This guide explains how you get access to EMMa as a new user. It consists of three sections:  Registering as a user – describes how to set yourself up as an EMMa user.

Add to Reading List

Source URL: emma.ecdc.europa.eu

Language: English - Date: 2015-05-18 03:47:48
413Computer access control / Computer security / Access control / Security / Multi-factor authentication / Password / Authentication / Security token / RSA SecurID / Phishing / Electronic authentication

Microsoft PowerPoint - OConnor_RoleOfLocationInCybersecurity_Final.pptx

Add to Reading List

Source URL: scpnt.stanford.edu

Language: English - Date: 2013-11-20 20:27:34
414Computer access control / Computer security / Computing / Identity management / Federated identity / Metadata standards / Shibboleth / Security Assertion Markup Language / SPNEGO / Identity provider / Kerberos / SAML-based products and services

Shibboleth Identity Provider (IdP) Version 3 Feature Update www.overtsoftware.com ©2016 Overt Software Solutions Ltd. All Rights Reserved

Add to Reading List

Source URL: www.overtsoftware.com

Language: English - Date: 2016-01-14 08:16:27
415Computer security / Computer network security / Cyberwarfare / Security / Computer access control / Ambient intelligence / Internet of things / OWASP / Authentication / Cross-site scripting / Internet

Internet of ThingsTop Ten

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-08-17 12:09:42
416Computer security / Cryptography / Software / Cryptography standards / Resource Access Control Facility / FIPS 140-2 / FIPS 140 / Z/OS / Code signing / IBM System z

z/OS Version 2 Release 1 RACF Signature Verification Security Policy IBM® z/OS® Version 2 Release 1 Security Server RACF® Signature Verification Module version 1.0 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-19 10:01:42
417Automatic identification and data capture / Ubiquitous computing / Privacy / Radio-frequency identification / Wireless / Computer access control / Cryptography / Molva / Authentication / Identification / Humancomputer interaction / Security

The Molva - Di Pietro scheme Problems with the identification Design flaws

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-10 03:06:40
418Computing / Computer security / Utility software / Identity management / Computer access control / SOA Security / WS-Security / Security Assertion Markup Language / WS-SecureConversation / WS-Policy / Security Patterns / XML Signature

trust claims buffer overrun tokens

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:40
419Security / Prevention / Computer security / Yves Bhar / Access control / Bessemer

August Raises $38 Million In Series B Funding Led By Bessemer Venture Partners Investment to Fuel Creation of New Products that Define Home Access SAN FRANCISCO—March 25, 2015—August, the technology company that brin

Add to Reading List

Source URL: august.com

Language: English - Date: 2016-04-20 19:27:45
420

Schreibtischverlängerung dank Access-Control-System von HIN

Add to Reading List

Source URL: www.tie.ch

Language: German - Date: 2011-06-21 03:40:00
    UPDATE