Access token

Results: 765



#Item
141Cloud standards / OAuth / Twitter / Two-factor authentication / Meetup / Password / Access token / Authentication / Security / Computing / Technology

Mastering MEAN: Managing authentication with OAuth and Passport Scott Davis Founder ThirstyHead.com

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2015-03-13 16:07:57
142Mobile telecommunications / Email / Employee self-service / Monash University / Mobile phone / Technology / Digital media / Electronics

Employee Self Service (ESS) Provision of Mobile Phone Number Important Information: Staff members can now access ESS from a computer external to the Monash network by requesting a six-digit passcode called a ‘token’

Add to Reading List

Source URL: www.adm.monash.edu.au

Language: English - Date: 2014-04-02 02:44:52
143Code division multiple access / Computer crimes / Security token / Malware / Authentication / Multi-factor authentication / Phishing / AKA / Password / Cryptography / Security / EMC Corporation

‘2nd-Wave’ Advanced Threats: Preparing for Tomorrow’s Sophisticated Attacks SESSION ID: ANF-W01 Nikos Triandopoulos Principal Research Scientist

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2014-02-27 17:24:07
144Two-factor authentication / One-time password / Password / Single sign-on / Multi-factor authentication / Risk-based authentication / Identity management / Security token / Password manager / Security / Access control / Computer security

NovemberStronger Authentication for Small and Mid-Sized Business Small and Mid-Sized Businesses (SMBs) authenticate their end-users primarily with passwords, in spite of the fact that passwords are less secure,

Add to Reading List

Source URL: www.globalsecuritymag.com

Language: English - Date: 2012-01-02 11:49:57
145Crime prevention / National security / Computer security / Password / Information security / Internet security / Backup / Access control / Security token / Security / Data security / Computer network security

Information Security Policy Data Classification Policy It is essential that all Fpweb.net client data be protected. There are however gradations that require different levels of security. All data should be reviewed on a

Add to Reading List

Source URL: www.fpweb.net

Language: English - Date: 2014-12-23 16:56:42
146Token / Authentication / Security token / Security / Computer security / Access token

High-Integrity Device Authentication at Internet Scale StrongNet™ secures your critical data and mobile devices.  Block sophisticated attacks, including root kits and pass the hash

Add to Reading List

Source URL: www.jwsecure.com

Language: English - Date: 2015-04-15 14:34:25
147Identification / Two-factor authentication / Authentication / Password / One-time password / Fingerprint / Security token / Multi-factor authentication / Security / Access control / Biometrics

ID Director for EpicCare August FINAL 2014.pub

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-08-26 15:54:57
148Software quality / Fuzz testing / Genetic algorithm / Session / Fitness function / Access token / Fitness landscape / Communications protocol / Code coverage / Software testing / Computing / Software engineering

Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
149Computer network security / Internet protocols / Self-certifying File System / Password authentication protocol / Security token / Kerberos / Access token / Password / RADIUS / Computing / Computer security / Microsoft Windows

To appear in the 19th ACM Symposium on Operating Systems Principles (SOSP ’03) Decentralized User Authentication in a Global File System Michael Kaminsky, George Savvides, David Mazières, M. Frans Kaashoek MIT Comput

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2003-08-31 20:05:26
150Computer security / Windows NT / Access token / Privilege escalation / Architecture of Windows NT / Kernel / Linux kernel / Windows Vista / Operating system / Microsoft Windows / Software / Computing

TECHNICAL WHITE PAPER Easy local Windows Kernel exploitation Abstract In this paper I detail how to easily exploit some kind of windows kernel vulnerabilities. This is

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 17:40:37
UPDATE