Access token

Results: 765



#Item
351Password / Security token / One-time password / Authentication / Password manager / Two-factor authentication / Security / Access control / Computer security

Authentication: "I Know You" Michael J. Corby, CCP, CISSP M Corby & Associates, Inc. Audience: Security Knowledgeable with varying backgrounds Summary:

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
352Notary / Packaging / Security token / Password / Multi-factor authentication / Identity management / Information security / Biometrics / Smart card / Security / Access control / Authentication

HSARPA Cyber Security R&D

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-01-02 12:08:35
353NASA / Government / Goddard Space Flight Center / Greenbelt /  Maryland / Access token

NASA IV&V Facility Out-Processing Form Information required from employees. All fields are required! 1. General: Employee name UUPIC2 Date of Last Day

Add to Reading List

Source URL: www.nasa.gov

Language: English - Date: 2014-04-28 10:16:08
354Computing / Access control / Electronic commerce / Computer network security / Security token / Entrust / Smart card / Credential / Cloud computing / Security / Identity management / Computer security

shutterstock_70571425 [Converted].eps

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2014-09-30 11:54:16
355Twilio / Subscriber identity module / Security token / Computer security / Representational state transfer / Access token / Application programming interface / Computing / Security / Cloud computing

VIRTUAL SIMs THE FUTURE OF TELEPHONY AS A SERVICE TATENDA TRUST GOTORA HARARE INSTITUTE OF TECHNOLOGY

Add to Reading List

Source URL: www.ubuntunet.net

Language: English - Date: 2014-11-21 11:14:54
356Computer crimes / Identity management / Computer network security / Two-factor authentication / Security token / Keystroke logging / Password / Application security / Managed security service / Security / Computer security / Access control

Protecting Merchant Point of Sale Systems during the Holiday Season November 7, 2014 Executive Summary This advisory was prepared in collaboration with the Financial Services Information Sharing and Analysis Center (FS-I

Add to Reading List

Source URL: www.secretservice.gov

Language: English - Date: 2014-11-18 16:53:20
357Computer security / Computer network security / Internet protocols / National security / Information security / Transport Layer Security / OAuth / Internet security / Access token / Security / Computing / Electronic commerce

Clever Security Overview Clever Security White Paper ___________________________________________________________________________

Add to Reading List

Source URL: assets.clever.com

Language: English - Date: 2014-11-25 20:24:17
358Access control / FIPS 201 / Standards / Security token / Smart cards / Two-factor authentication / Cryptography / Authentication / SecurID / Security / Computer security / Identity management

Comments and Resolutions for Special Publication[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-19 14:14:47
359Data / Information / Data integrity / Data quality / Transaction processing / Token coin / Access token / Database / Hash function / Data management / Computer security / Database management systems

DigCCurr2009Proceedings_CH0319noon.pdf

Add to Reading List

Source URL: wiki.umiacs.umd.edu

Language: English - Date: 2010-02-22 21:01:54
360SCIP / Security / Access token / Defense Security Cooperation Agency / Computer security / Secure Communications Interoperability Protocol / Advanced Encryption Standard / EMC Corporation / SecurID

DEFENSE SECURITY COOPERATION AGENCY 201 12m STREET SOUTH, STE 203 ARLINGTON, VA[removed]OCT[removed]MEMORANDUM FOR DEPUTY ASSISTANT SECRETARY OF THE ARMY FOR

Add to Reading List

Source URL: samm.dsca.mil

Language: English - Date: 2014-10-23 13:06:33
UPDATE