Access control

Results: 10445



#Item
591Computer access control / Access control / Authorization / Seasoned tradeline / Direct debit

FOR INTERNAL USE (1bank) User ID: …………………………… Checked: ………………………..... Authorization/Application for the Appointment of an Authorized Person This application is to be completed if y

Add to Reading List

Source URL: www.bankofcyprus.com.cy

Language: English - Date: 2016-07-05 07:31:35
592

WWW.ONETEC.EU CONTROL ACCESS AND TICKETING WITH DIGITAL SCANNERS EASY

Add to Reading List

Source URL: www.onetec.eu

- Date: 2014-12-02 02:59:22
    593Computer configuration / Control Panel / Access control / Windows / Start menu / Digital video recorder

    Centralized Monitoring Management Platform Manual 3

    Add to Reading List

    Source URL: www.lowcost-security.ch

    Language: English - Date: 2015-02-11 08:34:11
    594Payment systems / Credit cards / Computer access control / E-commerce / 3-D Secure / One-time password / Debit card / Visa Inc. / MasterCard / Password / Transaction authentication number / Rede S.A.

    BNU MasterCard Debit Card One-Time Password for Your Secure Online Purchases

    Add to Reading List

    Source URL: www.bnu.com.mo

    Language: English - Date: 2015-01-29 21:30:42
    595Key management / Public-key cryptography / Computer access control / Public key infrastructure / Certificate authorities / Authentication / Public key certificate / IdenTrust

    IdenTrust™ Trust Counsel Smarter and Faster Trust Deployment The IdenTrust™ Trust Counsel service provide corporations, governments, and financial institutions with the expertise and implementation assistance require

    Add to Reading List

    Source URL: www.identrust.com

    Language: English - Date: 2014-04-24 20:51:56
    596Computer access control / Automatic identification and data capture / User interface techniques / Markup languages / Speech synthesis / VoiceXML / Speaker recognition / Interactive voice response / Call Control eXtensible Markup Language / Authentication / Multi-factor authentication / Biometrics

    DRAFT February, 2006 Speaker Identification and Verification Applications

    Add to Reading List

    Source URL: www.voicexml.org

    Language: English - Date: 2015-06-05 20:40:12
    597Computer security / Access control / Identity management / Perimeter security / Physical security / Information security

    The University of Alabama Access to Building Information Policy Background On occasion, there are requests for access to, building plans, architectural drawings, blueprints, engineering plans, buildings specifications, s

    Add to Reading List

    Source URL: bis.ua.edu

    Language: English - Date: 2013-10-02 12:17:18
    598Computer access control / Hypertext Transfer Protocol / Access control / Identity management / Security / HTTP cookie / Authentication / Password / Login / Session

    A Detailed Description of the PAPI Protocol The PAPI Development Team <> Contents 1 An overview of PAPI 1.1

    Add to Reading List

    Source URL: papi.rediris.es

    Language: English - Date: 2008-09-21 16:36:09
    599Computer security / Security / Crime prevention / Cryptography / National security / Clarizen / Password / Single sign-on / Application security / Access control / Information security

    CLARIZEN SECURITY WHITE PAPERClarizen Security

    Add to Reading List

    Source URL: www.clarizen.com

    Language: English - Date: 2016-01-28 15:47:56
    600Internet in India / Ministry of Communications and Information Technology / Computer access control / DigiLocker / Documents / Aadhaar / Digital India / Digital locker / Password / Biometrics / Authentication / Form

    User Manual: DigiLocker DigiLocker User Manual (https://digitallocker.gov.in) Department of Electronics and

    Add to Reading List

    Source URL: digilocker.gov.in

    Language: English - Date: 2016-08-20 08:44:22
    UPDATE