Computer access control

Results: 4654



#Item
991A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2012-01-27 15:46:35
992IA OIF-MLGMulti-link Gearbox Implementation Agreement IA # OIF-MLG-02.0

IA OIF-MLGMulti-link Gearbox Implementation Agreement IA # OIF-MLG-02.0

Add to Reading List

Source URL: www.oiforum.com

Language: English - Date: 2013-05-02 12:59:39
993UNITED STATES DEPARTMENT OF COMMERCE Economics and Statistics Administration BUREAU OF ECONOMIC ANALYSIS Washington, D.C.

UNITED STATES DEPARTMENT OF COMMERCE Economics and Statistics Administration BUREAU OF ECONOMIC ANALYSIS Washington, D.C.

Add to Reading List

Source URL: bea.gov

Language: English - Date: 2015-03-17 15:51:55
994Gigabit PoE Injector  PRODUCT DATASHEET Remote Power feeding made easy The single port GPI-115 Power over Ethernet (PoE) injector offers a compact and cost- effective, fully IEEE

Gigabit PoE Injector PRODUCT DATASHEET Remote Power feeding made easy The single port GPI-115 Power over Ethernet (PoE) injector offers a compact and cost- effective, fully IEEE

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:32
995Instructions:  Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

Instructions: Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

Add to Reading List

Source URL: www.himss.org

Language: English - Date: 2013-02-13 10:28:31
996Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter). People make mistak

Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter). People make mistak

Add to Reading List

Source URL: rebootpeterborough.ca

Language: English - Date: 2013-04-28 04:02:58
997Cyber & Information  a s s u ra n c e Land Mobile Radio System Product & Services Offerings

Cyber & Information a s s u ra n c e Land Mobile Radio System Product & Services Offerings

Add to Reading List

Source URL: pspc.harris.com

Language: English - Date: 2014-05-22 09:41:34
998FortiAPTM-221B and 223B Integrated Wireless Security and Access The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without c

FortiAPTM-221B and 223B Integrated Wireless Security and Access The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without c

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:19
999Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security

Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security

Add to Reading List

Source URL: delfigosecurity.com

Language: English
1000Single Sign-On Release Information FAMIS Post-Conference Workshop June 26, 2013

Single Sign-On Release Information FAMIS Post-Conference Workshop June 26, 2013

Add to Reading List

Source URL: www.famisonline.org

Language: English - Date: 2013-06-26 15:58:09