Access token

Results: 765



#Item
131System software / Windows XP / Computer network security / Security token / Common Access Card / Gemalto / Windows Server / Windows / Encrypting File System / Microsoft Windows / Smart cards / Computing

PDF Document

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2013-06-18 06:50:24
132Computing / Integrated Windows Authentication / Kerberos / SPNEGO / NTLM / Active Directory / Access token / Password / Authentication / Microsoft Windows / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.javasystemsolutions.com

Language: English - Date: 2011-09-13 15:51:45
133Identity management / Data security / Clarksburg /  West Virginia / Criminal Justice Information Services Division / Information security / Authorization / Security token / Single sign-on / Authentication / Security / Computer security / Access control

PDF Document

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2014-11-11 11:13:52
134Privilege escalation / Lenovo / Vulnerability / Code signing / Malware / Privilege / Access token / Ring / Computer security / Computing / Cyberwarfare

IOActive Security Advisory Title Lenovo’s System Update Uses a Predictable Security Token Severity

Add to Reading List

Source URL: www.ioactive.com

Language: English
135Access token / Computing / Technology / Application programming interface / Technical communication / Representational state transfer

EIDR SYSTEM VERSION 2.0 REGISTRY PROGRAMMER’S GUIDE Jan. 6, 2014 Copyright © by the Entertainment ID Registry Association

Add to Reading List

Source URL: eidr.org

Language: English - Date: 2014-02-06 20:17:44
136Computer network security / Crime prevention / National security / Access control / Identity management / Access token / Information security / Network security / User / Security / Computer security / Computing

bel_SolutionCenter_HGweiss

Add to Reading List

Source URL: www.bachmann.info

Language: English - Date: 2014-11-04 05:44:53
137Computer network security / Key management / Cloud infrastructure / Apache Hadoop / Cloud computing / Single sign-on / Kerberos / Generic Security Services Application Program Interface / Access token / Computing / Computer security / Cryptography

Hadoop Security Design Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell Yahoo! {owen,kan,sradia,rmarti,cnh}@yahoo-inc.com October 2009

Add to Reading List

Source URL: issues.apache.org

Language: English
138Two-factor authentication / Usability / Authentication / Security token / Likert scale / Password / Email / Multi-factor authentication / One-time password / Security / Access control / Technology

Microsoft Word - Poster abstaract - Balancing usability and security in the business cloud authentication V3.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
139Security / Security token / Access token / Token

BusinessBank Application/Advice of Change A. Account holder details Title of Business Address of Business

Add to Reading List

Source URL: www.tsbbank.co.nz

Language: English - Date: 2014-10-12 21:57:02
140One-time password / Password / Transaction authentication number / Online banking / Interactive voice response / Bank / Electronic commerce / Password manager / Security token / Security / Access control / Computer security

Conditions for NemID business for banking, vBlocking NemID business for banking is a security solution that you can use for

Add to Reading List

Source URL: www.nemid.nu

Language: English - Date: 2015-02-07 17:01:33
UPDATE