Assertion

Results: 1026



#Item
81Software development / Software testing / Software engineering / Extreme programming / Test-driven development / Unit testing / Acceptance testdriven development / Acceptance testing / Assertion / Continuous integration

Kinds of Unit Tests TDD Principles Red Bar Patterns

Add to Reading List

Source URL: www.planetgeek.ch

Language: English - Date: 2011-02-04 06:57:29
82Computing / Digital media / Computer access control / Identity management systems / Identity management / Security Assertion Markup Language / Password / Email / Infrastructure optimization / Internet

Align Engage your employees with secure video. Ustream Align makes it easy to deliver town halls, trainings and departmental communications to employees everywhere.

Add to Reading List

Source URL: info.ustream.tv

Language: English - Date: 2016-06-04 02:23:00
83

0 It is suggested that these booklets are read in the order of their publication beginning with the introductory Issue 1 – ‘The Ultimate Assertion: evidence of supernatural design in the divine prologue.’

Add to Reading List

Source URL: www.whatabeginning.com

Language: English - Date: 2015-11-11 11:19:56
    84Computing / Identity management / Computer access control / Metadata standards / Security Assertion Markup Language / GARR / Software / Data

    Authentication and Authorisation for Research and Collaboration JRA.14 Updates on MJRA1.3 Deliverable Davide Vaghetti

    Add to Reading List

    Source URL: aarc-project.eu

    Language: English - Date: 2016-05-25 10:41:42
    85

    Adaptive Assertion-Level Proofs (Extended Abstract)∗ Christoph Benzm¨uller Articulate Software, USA Marvin Schiller

    Add to Reading List

    Source URL: www.marvin-schiller.de

    Language: English - Date: 2010-09-26 13:49:17
      86Computer access control / Identity management / Federated identity / Cloud standards / OpenID / OAuth / Security Assertion Markup Language / Password manager / Single sign-on / XRDS / Authentication / Phishing

      Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk

      Add to Reading List

      Source URL: www.nds.rub.de

      Language: English - Date: 2016-04-20 11:46:50
      87Computer access control / Identity management / Metadata standards / Federated identity / Security Assertion Markup Language / SAML 2.0 / Shibboleth / Meteor

      Microsoft Word - MeteorV4_ReleaseNotes_FINAL_02092012

      Add to Reading List

      Source URL: www.meteornetwork.org

      Language: English - Date: 2014-10-21 09:11:01
      88

      3 Security Assertion Markup Language (SAML) 2.0 Technical Overview 4

      Add to Reading List

      Source URL: www.oasis-open.org

      Language: English
        89Identity management / Computer access control / Federated identity / Metadata standards / Identity assurance / SAML 2.0 / OpenID / Security Assertion Markup Language / Authentication / Identity provider / Privacy-enhancing technologies / Digital identity

        Toward Mending Two Nation-Scale Brokered Identification Systems

        Add to Reading List

        Source URL: www0.cs.ucl.ac.uk

        Language: English - Date: 2015-05-15 18:39:32
        90Computing / Computer access control / Software / Identity management / Federated identity / Java enterprise platform / Java platform / OpenAM / ForgeRock / OpenDJ / Single sign-on / Security Assertion Markup Language

        CASE STUDY: PLUS RETAIL AXI ITS, a ForgeRock partner, Implements a Federated SSO Architecture for PLUS Retail About PLUS Retail PLUS Retail is a subsidiary of Sparrowhawk Group, an organization run by and for independen

        Add to Reading List

        Source URL: www.forgerock.com

        Language: English - Date: 2015-06-10 15:46:52
        UPDATE