Access control

Results: 10445



#Item
791Internet privacy / Web analytics / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Google Analytics / Web browser / Google Chrome / JavaScript / Analytics / Mobile web analytics

Cookies policy Cookies are small text files placed on the disk drive of a terminal device while you use websites. Thanks to those files, the website administered by ATM S.A. (hereinafter: the Website) identifies your com

Add to Reading List

Source URL: en.atman.pl

Language: English - Date: 2013-02-15 05:59:33
792Working groups / IEEE standards / MAC address / Media access control / Privacy / Communications protocol / Internet privacy / IEEE Standards Association / IEEE 802

IEEE 802 EC SG Privacy Recommendation Minutes of EC Privacy Recommendation SG Teleconference November 3-7, 2014 Date: 13 January 2015 Author(s):

Add to Reading List

Source URL: mentor.ieee.org

Language: English - Date: 2015-01-13 11:37:18
793Physical security / E-commerce / Identity document / Card security code / Security guard / Access control / Credit card

RevisedMeharry Medical College Building Access Policy Purpose: In order to maintain campus safety and the security of college property, the issuance of identification cards shall be control under the provision

Add to Reading List

Source URL: www.mmc.edu

Language: English - Date: 2016-08-17 18:55:00
794Computer access control / Identity management / Federated identity / Cloud infrastructure / Provisioning / Single sign-on / Cloud computing / Security Assertion Markup Language / Customer relationship management / Identity management system / SAML-based products and services

MARKET UPDATE Identity & Access Management Services Introduction Champion

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2013-06-28 13:07:23
795Computer access control / Password / Security / Login

How to Renew your Items Online 1. Go to CRDL website (www. http://www.cln.bc.ca/) 2. Click on My Account located at the top right hand corner of the webpage 3. You will be prompted to log in. Enter your Username first. Y

Add to Reading List

Source URL: www.cln.ca

Language: English - Date: 2015-03-03 13:57:56
796Industrial automation / CANopen / USB / Rotary encoder / Relay / Control theory / Access control

02_logo_claim_4c_en_CS4

Add to Reading List

Source URL: www.schmersal.net

Language: English - Date: 2015-10-07 06:42:22
797Password / Security / Computer access control / Control key / Login / Point and click

Login with your username and password

Add to Reading List

Source URL: www.arcteassessment.com

Language: English - Date: 2015-11-30 22:39:06
798Markup languages / Technical communication / XML schema / XML tree / B-tree / Node / HTML element

ACCOn: Checking Consistency of XML Write-Access Control Policies Loreto Bravo1 1 James Cheney1

Add to Reading List

Source URL: users.ics.forth.gr

Language: English - Date: 2010-09-29 12:17:00
799Computer access control / Humancomputer interaction / Password / Security / Authentication / Usability / Question / Cognitive password / Self-service password reset

Submission to Workshop on Human-Computer Interaction and Security Systems – April 6, 2003 – Fort Lauderdale, Florida Designing Secure Yet Usable Credential Recovery Systems With Challenge Questions Mike Just Treasur

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-15 11:59:36
800Biometrics / Computer access control / Automatic identification and data capture / Speaker recognition / Speech processing / Authentication / Card reader / Tatra banka / Tatra / Interactive voice response / Agnitio

CASE STUDY JUST THE VOICE TO VERIFY THE IDENTITY OF TATRA BANKA CLIENTS COMPANY: Tatra Banka

Add to Reading List

Source URL: old.soitron.sk

Language: English - Date: 2015-07-26 08:46:26
UPDATE