Access token

Results: 765



#Item
561Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ctan.space-pro.be

Language: English - Date: 2014-09-06 04:58:27
562Access control / Credit cards / Data privacy / Electronic commerce / Payment systems / Password / Payment Card Industry Data Security Standard / Two-factor authentication / Security token / Computer security / Security / Computer law

The button for purchases on the keyboard. Online shop.

Add to Reading List

Source URL: www.mastercard.com

Language: English - Date: 2013-01-04 12:45:10
563Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: download.nus.edu.sg

Language: English - Date: 2014-09-06 04:58:27
564Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ftp.leg.uct.ac.za

Language: English - Date: 2014-09-06 04:58:27
565Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ctan.math.utah.edu

Language: English - Date: 2014-09-06 04:58:27
566Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: mirror.physik-pool.tu-berlin.de

Language: English - Date: 2014-09-06 04:58:27
567Access control / Internet protocols / Identity / Internet standards / Cryptographic protocols / Authentication / Security token / Extensible Authentication Protocol / Password authentication protocol / Computer security / Security / Computing

OATH Reference Architecture Release 1

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:30:58
568EMC Corporation / SecurID / Identity management / One-time password / Two-factor authentication / Password / Access control / Access token / Login / Security / Computer security / Advanced Encryption Standard

Alert[removed]: Incident Prevention and Detection: Protecting Information Security of National Banks

Add to Reading List

Source URL: www.ots.treas.gov

Language: English - Date: 2014-09-28 08:50:31
569Identity management systems / Federated identity / IBM Tivoli Access Manager / IBM Tivoli Directory Server / Security token / IBM Tivoli Identity Manager / Two-factor authentication / Single sign-on / IBM Tivoli Framework / Security / System software / Computer security

FACT SHEET - February 23, 2004

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:28:57
570ITunes / IPhone / Smartphones / IOS / Multi-touch / Security token / IPad / ICloud / App Store / Software / Apple Inc. / Computing

Deploying iPhone and iPad Security Overview iOS, the operating system at the core of iPhone and iPad, is built upon layers of security. This enables iPhone and iPad to securely access corporate services and protect impor

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2013-09-30 04:31:01
UPDATE