Access token

Results: 765



#Item
441Federated identity / Password / PowerSchool / Single sign-on / Security token / Password notification email / Security / Access control / Computer security

PowerSchool 7.x Parent Portal User Guide

Add to Reading List

Source URL: images.pcmac.org

Language: English - Date: 2013-09-08 10:44:20
442Compiler construction / Lexical analysis / Parsing / Programming language implementation / Access token / Java / Computing / Software engineering / Software

Additional NLS Tools • • • •

Add to Reading List

Source URL: lexsrv3.nlm.nih.gov

Language: English - Date: 2009-11-23 15:35:20
443Password / One-time password / Authentication / EMV / Multi-factor authentication / Smart card / Phishing / Security token / Two-factor authentication / Security / Access control / Cryptography

ShareThis_Twitter_LinkedIn_3.2.eps

Add to Reading List

Source URL: www.business.att.com

Language: English - Date: 2014-10-06 12:09:18
444Identity management / Superuser / System administration / Password / User / Authentication / Information security / Security token / Principle of least privilege / Security / Computer security / Access control

ANDREW M. CUOMO Governor STATE OF NEW YORK State Capitol P.O. Box 2062 Albany, NY[removed]

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-10-07 15:28:19
445Computer file formats / Computing / GRIB / NetCDF / Advanced Weather Interactive Processing System / Computer file / Access token / Meteorology / Atmospheric sciences / Earth sciences graphics software

Processing Local MPE Output For D2D Display Office of Hydrologic Development Hydrologic Software Engineering Branch[removed]

Add to Reading List

Source URL: www.nws.noaa.gov

Language: English - Date: 2012-07-19 09:46:22
446Identity management / Superuser / System administration / Password / User / Authentication / Security token / Information security / Principle of least privilege / Security / Computer security / Access control

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-013

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-10-07 15:28:05
447Computer network security / Security token / FIPS 140 / Hardware security module / Access control / PCI Express / Smart card / Security / Cryptography standards / Computer security

nShield Security Policy ™ CI PHE R

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-08-28 01:00:00
448Security token / Access token / Key size / Password / Key / Authentication / Transaction authentication number / Token / PKCS / Cryptography / Security / Key management

Microsoft Word - CR-1356_sep25rev.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
449Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ctan.mirrorcatalogs.com

Language: English - Date: 2014-10-30 12:02:31
450Computer security / FIPS 140-2 / FIPS 140 / PCI Express / Security token / Hardware security module / Linux kernel / Memory protection / Access control / Cryptography standards / Computing / Security

nShield Security Policy ™ CI PHE R

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-01-28 00:00:00
UPDATE