Access control

Results: 10445



#Item
431Microsoft / Computer access control / Computing / Webmail / Email / Password / Login / Outlook.com / Microsoft account / Self-service password reset

Dealer Licensing Online Services Administrative User/User set up through ODPS Identity Manager

Add to Reading List

Source URL: www.publicsafety.ohio.gov

Language: English - Date: 2015-09-28 07:03:37
432Media access control / Computing / IEEE 802.11 / Wireless networking / IEEE 802 / Local area networks / Network architecture / Carrier sense multiple access with collision avoidance / Carrier sense multiple access / Wireless LAN / Network allocation vector / Wireless mesh network

Directional CSMA/CA Protocol with Spatial Reuse for mmWave Wireless Networks Michelle X. Gong, Dmitry Akhmetov, Roy Want Shiwen Mao

Add to Reading List

Source URL: www.roywant.com

Language: English - Date: 2010-03-13 13:48:42
433Software / Utility software / System software / Bioinformatics / Pubget / Search engine software / Computer access control / Password / Login / Expect

PUBGET and the WORLDCAT KNOWLEDGE BASE Implementation from the Serials/E-Resources perspective The main benefit for using Pubget for ILL Direct Request for Articles: Pubget automatically updates the WorldCat Knowledge Ba

Add to Reading List

Source URL: www.vivalib.org

Language: English - Date: 2013-10-24 12:25:42
434Web accessibility / Business / Design / Professional studies / Section 508 Amendment to the Rehabilitation Act / Accessibility / Purchasing / Web Accessibility Initiative / Assistive technology / Radiation Control for Health and Safety Act / Common Criteria

3M Multi-touch display CP3266PW; Rev

Add to Reading List

Source URL: access.sdsu.edu

Language: English - Date: 2015-04-23 14:32:47
435Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / World Wide Web / Computing / Hypertext

Cookies This site uses cookies to offer you a better browsing experience. Find out more on how we use cookies and how you can change your settings . Mr. Placencia, Carlos Architect

Add to Reading List

Source URL: policytransfer.metropolis.org

Language: English - Date: 2016-08-22 00:53:59
436Computing / Software / Computer access control / Identity management / Free software / Java platform / Java enterprise platform / ForgeRock / OpenAM / OpenIDM / OpenDJ / Educational technology

UNIVERSITY DATASHEET School of (Forge)Rock Determining how to architect, build and deploy your open-source identity solution can be a complex

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-02-29 13:17:27
437Computer access control / Pharmaceutical industry / Validity / Authentication / Notary / Packaging / Validation / Business / Computer security / Security

UCD Activities and Progress 2014–11–18 Mark Rose and Rich Keller PDS User Centered Design

Add to Reading List

Source URL: mgmt.pds.nasa.gov

Language: English - Date: 2014-11-18 09:37:20
438Food and drink / Cookies / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Mug

FINAL EXAMINATION INTRODUCTION TO INTELLECTUAL PROPERTY Paul Ohm December 15, 2007 Instructions: Please read these instructions carefully before proceeding.

Add to Reading List

Source URL: paulohm.com

Language: English - Date: 2008-11-20 13:19:32
439Computer access control / Access control / Prevention / Computer security / Password / Security / Registered user / Login

REGISTRATION AGREEMENT TO VIEW RECORDS ONLINE JEFFERSON COUNTY CLERK OF COURT REQUEST FORM: *Registered User Name: *E-mail Address *Address *City/State/Zip

Add to Reading List

Source URL: jeffersonclerk.com

Language: English - Date: 2016-05-16 09:26:53
440Computer security / Security / Prevention / Computer access control / Pre-boot authentication / USB flash drive / Authentication / Trusted Platform Module / Password / Acer N50 / Disk encryption

Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

Add to Reading List

Source URL: static.acer.com

Language: English - Date: 2013-10-24 05:13:45
UPDATE