Access management

Results: 12376



#Item
451Computing / Computer network security / Computer security / Cyberwarfare / Computer networking / Firewall / Router / Proxy server / Computer network / Denial-of-service attack / Network security / Networking hardware

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Monthly Peer Reviewed Open Access International e-Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-03-03 02:57:15
452Computer access control / Cryptography / Computer security / Identity management / Password / Security / One-time password / Challengeresponse authentication / Crypt / Key derivation function / Password strength / Password fatigue

Mercury: Recovering Forgotten Passwords Using Personal Devices⋆ Mohammad Mannan1 , David Barrera2, Carson Brown2, David Lie1 , and Paul C. van Oorschot2 1

Add to Reading List

Source URL: www.eecg.toronto.edu

Language: English - Date: 2010-12-21 12:01:07
453Computing / Computer access control / Computer security / Directory services / Federated identity / Internet Standards / Identity management / Lightweight Directory Access Protocol / Shibboleth / Electronic authentication / Authentication / HTTP cookie

PAPI and LDAP Using directories for local authentication and authorization Diego R. López

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:53
454Business / Economy / Professional studies / Supply chain management / Systems engineering / Procurement / Section 508 Amendment to the Rehabilitation Act / Web accessibility / Purchasing / ATI Technologies / Government procurement in the United States / Military acquisition

Contract and Procurement Management Business and Financial Affairs

Add to Reading List

Source URL: access.sdsu.edu

Language: English - Date: 2011-12-13 13:21:59
455Library science / Internet search engines / Information science / Information management / Information / Library catalog / Public library / Library / Password / Search engine results page / Search engine technology

USING THE ONLINE LIBRARY CATALOG You can access the library catalog by visiting the library’s website: www.jclib.org. The catalog will allow you to search for library materials, including books, audio books, magazines,

Add to Reading List

Source URL: www.jclib.org

Language: English - Date: 2016-01-05 14:05:13
456Software / Computing / Internet marketing / Data management / Web analytics / Analytics / Big data / Business intelligence / Mathematical finance / Search engine optimization / Influencer marketing / Seo

Experteer is Europe‘s premium career network reaching thousands of professionals who choose Experteer as their trusted source to access senior level positions. We aim to offer the most senior level career opportunities

Add to Reading List

Source URL: experteer-downloads.s3.amazonaws.com

Language: English - Date: 2016-07-25 10:42:23
457Subdivisions of India / Geography of Gujarat / Gujarat / Geophysics / Mehsana district / Global Positioning System / Sun Temple /  Modhera / Mehsana / Geophone / Becharaji / Exploration geophysics / Modhera

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-16 07:01:44
458Technology / Wireless networking / Electronics / Electronic countermeasures / Telecommunications engineering / Denial-of-service attacks / Computer network security / IEEE 802.11 / Electronic counter-countermeasure / Radio jamming / Wireless security / Wireless ad hoc network

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-27 11:39:29
459Cryptography / Public key infrastructure / Public-key cryptography / Transport Layer Security / Key management / Computer access control / SOA Security / Security Assertion Markup Language / Revocation list / Online Certificate Status Protocol / WS-Security / Certificate authority

trust claims tokens XML-Encryption

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:27
460Transport / Land transport / Road transport / Road traffic management / BP / Lane / Traffic / Interstate 35E / High-occupancy vehicle lane / Ramp meter / Active traffic management / Controlled-access highway

Mobility Investment Priorities Corridor Project Checklist Instruction Notes:  Already Included – strategy is already integrated into corridor projects. *Use codes below for this column only: o BP: Best Practice is b

Add to Reading List

Source URL: mobility.tamu.edu

Language: English - Date: 2015-08-19 17:31:04
UPDATE