Access key

Results: 1959



#Item
431Internet standards / Internet protocols / Cryptographic protocols / Secure communication / Public-key cryptography / Transmission Control Protocol / Lightweight Directory Access Protocol / Transport Layer Security / Certificate authority / Cryptography / Computing / Internet

SSL Protocol The Transmission Control Protocol/Internet Protocol (TCP/IP) governs the transport and routing of data over the Internet. Other protocols, such as the Hypertext Transport Protocol (HTTP), Lightweight Directo

Add to Reading List

Source URL: www.cryptoheaven.com

Language: English - Date: 2011-03-01 12:16:22
432Real estate / Concrete / Formwork / Housing / Affordable housing / Construction / Moladi / Architecture

Low Cost Housing Decent low cost housing is one of the key factors in the fight against poverty and social exclusion. It is not just about putting a roof over someone’s head. Academic research proves that access to a c

Add to Reading List

Source URL: www.moladi.com

Language: English - Date: 2012-12-30 16:40:28
433Access control list / Conj / Man-in-the-middle attack / Public-key cryptography / Mathematical proof / Communications protocol / Data / Information / Mathematics

Confidentiality-Preserving Distributed Proofs of Conjunctive Queries Adam J. Lee† Kazuhiro Minami‡

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:19
434Identification key / Plant taxonomy / Computing / Multi-access key / Function key / Web page / Data Matrix / Internet Relay Chat / Identification / World Wide Web / Taxonomy / Animal identification

Dallwitz, M.J., Paine, T.A., and Zurcher, E.Jonwards. Interactive identification using the Internet. http://delta-intkey.com Interactive Identification Using the Internet 7 April 2007

Add to Reading List

Source URL: delta-intkey.com

Language: English - Date: 2007-04-07 09:05:12
435Business marketing / Business / Marketing / Citrix Systems / Remote desktop

ICT Executive Profile Based on feedback from the annual survey around having access to more senior women as role models, each month we have an executive profile compiled from 7 questions posed to key executive women in t

Add to Reading List

Source URL: www.fitt.org.au

Language: English - Date: 2014-05-03 08:20:39
436Fluid mechanics / Aerodynamics / Piping / Knowledge / Remote laboratory / Reynolds number / Labshare / Laboratories / Engineering / Science

11 Key factors for determining the suitability of converting a fluid-mechanics laboratory to remote-access mode * AHMF Anwar, E Lindsay† and PR Sarukkalige Curtin University, Perth, Western Australia

Add to Reading List

Source URL: www.engineersmedia.com.au

Language: English - Date: 2014-11-25 20:53:20
437Computer programming / Information science / HyperCard / Hypertext / DELTA / Taxonomic database / Multi-access key / APL / HyperTalk / Computing / Taxonomy / Software engineering

DELTA Newsletter ISSNNumber 10, AprilCONTENTS

Add to Reading List

Source URL: delta-intkey.com

Language: English - Date: 2003-11-25 07:47:14
438Occupations / Accounting software / Professional accountancy bodies / Business ethics / Accounting systems / Business / Accountancy / Finance

Employer in the spotlight Access to the key to success Name: Martin Chao Title: General Manager

Add to Reading List

Source URL: www.hkiaat.org

Language: English - Date: 2011-10-24 19:02:15
439Software / Computer network security / Key management / Internet standards / Kerberos / OpenLDAP / FreeIPA / Lightweight Directory Access Protocol / Passwd / Directory services / Computer security / Computing

FreeIPA - Control your identity LinuxAlt 2012 Martin Koˇsek, <> Sr. Software Engineer, Red Hat Nov 3rd , 2012

Add to Reading List

Source URL: www.freeipa.org

Language: English - Date: 2013-05-13 02:17:24
440Computer network security / Key management / Cloud infrastructure / Apache Hadoop / Cloud computing / Single sign-on / Kerberos / Generic Security Services Application Program Interface / Access token / Computing / Computer security / Cryptography

Hadoop Security Design Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell Yahoo! {owen,kan,sradia,rmarti,cnh}@yahoo-inc.com October 2009

Add to Reading List

Source URL: issues.apache.org

Language: English
UPDATE