Access token

Results: 765



#Item
481Computer security / Access token / Security / Federated identity / Cloud standards / Computing / OAuth

OAuth 2.0 and the Road to XSS: attacking Facebook Platform Andrey Labunets — @isciurus Who is @isciurus •

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:04:34
482Social psychology / Persecution / Bullying / Human behavior / Access token / Computer security / Cyber-bullying / Token coin / Ethics / Abuse / Behavior

Sample Rubrics for Positive Encouragement for Active Bystanders Grades 1-6 Behavior Harassment or Considerations Severe Physical

Add to Reading List

Source URL: www.iptv.org

Language: English - Date: 2008-02-27 10:19:48
483Access control / Two-factor authentication / Online banking / Mutual authentication / Information security / Authentication / Security token / Layered security / Bank / Security / Computer security / Multi-factor authentication

Microsoft Word - faqdoc.doc

Add to Reading List

Source URL: www.occ.treas.gov

Language: English - Date: 2014-10-19 09:39:18
484Cryptography / Password / Passphrase / One-time password / Two-factor authentication / Cryptographic software / Security token / Crypt / Dictionary attack / Security / Computer security / Access control

Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:04
485SMS / Text messaging / Transaction authentication number / Password / Access token / User / Electronic commerce / Identity management / Technology / Mobile technology / Computer security

Security Management System MHPD Module 1

Add to Reading List

Source URL: omh.ny.gov

Language: English - Date: 2011-01-27 11:50:41
486Social psychology / Persecution / Bullying / Human behavior / Access token / Computer security / Cyber-bullying / Token coin / Ethics / Abuse / Behavior

Sample Rubrics for Positive Encouragement for Active Bystanders Grades 1-6 Behavior Harassment or Considerations Severe Physical

Add to Reading List

Source URL: www.k12connections.iptv.org

Language: English - Date: 2008-02-27 10:19:48
487Computer security / System software / Windows CardSpace / Information Card / OpenID / Security Assertion Markup Language / Identity provider / Security token / Active Directory Federation Services / Federated identity / Identity / Identity management

“Geneva” Claims Based Access Platform Beta 1 Datasheet Microsoft Identity and Access solutions are a set of platform technologies and products designed to help organizations manage user identities and associated acc

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-10-20 12:56:11
488

***DOD EMALL IS FULLY CAC/PKI ENFORCED*** To log on to DOD EMALL, user must have one of the following: 1. DOD Common Access Card (CAC)/HSPD-12 equivalent 2. External Certificate Authority (ECA) Medium Token If you have n

Add to Reading List

Source URL: www.landandmaritime.dla.mil

- Date: 2013-05-14 10:48:04
    489Identity management systems / Federated identity / Identity management / Security Assertion Markup Language / Internet standards / SAML 2.0 / Access token / Security token / Shibboleth / Computing / System software / Computer security

    Meteor 4 Token Provider Implementation Guide Version 1.2 Contributors: Richard Allen

    Add to Reading List

    Source URL: www.meteornetwork.org

    Language: English - Date: 2013-05-09 10:14:08
    490Security / Computing / Information / Metadata / Open Archives Initiative Protocol for Metadata Harvesting / Open access / Access token / Authentication / User / Archival science / Digital libraries / Internet protocols

    Requester Information Name: E-Mail: Position:

    Add to Reading List

    Source URL: ands.org.au

    Language: English - Date: 2011-09-25 21:47:49
    UPDATE