Computer access control

Results: 4654



#Item
191Computing / IEEE 802.11 / Wireless networking / Computer network security / Protected Extensible Authentication Protocol / Wi-Fi Protected Access / Control Panel / Wi-Fi / Extensible Authentication Protocol / Wireless security

Get Connected with KSU WiFi – Windows 7 Note: Windows Wireless Manager must be enabled. KSU Service Desk Faculty & Staff: Students:

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2015-11-25 10:43:55
192Computer access control / Computer security / Access control / Password / Security / Login / Identity management / Password strength / Password management

Nissan Tech Info Dealer User Guide Version 4.0 Date Copyright© 2014 by Nissan Motor, Ltd.

Add to Reading List

Source URL: www.nissan-techinfo.com

Language: English - Date: 2014-09-23 13:56:51
193Security / Computer security / Computer access control / Computer network security / Access control / Identity management / Multi-factor authentication / Authentication / Virtual private network / Secure Shell / Security token / Wireless security

Aintree NHS – Case Study Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
194Computer access control / Cryptography / Computer security / Distance-bounding protocol / Security / Ubiquitous computing / Challengeresponse authentication / Radio-frequency identification / IP / Security token / NP / Cryptographic nonce

An RFID Distance Bounding Protocol Gerhard P. Hancke, Markus G. Kuhn University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK {gh275,mgk25}@cl.cam.ac.uk Abstract

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2005-11-25 11:04:54
195Computing / Directory services / French Revolution / Computer access control / Active Directory / Windows / Software / Email / French Directory / Apple Open Directory

*Form Valid UntilState Security Access Form Active Directory Account Manager Establishes a Manager to maintain Active Directory accounts (add/delete Active Directory accounts and modify email address).

Add to Reading List

Source URL: adedata.arkansas.gov

Language: English - Date: 2016-08-05 10:46:05
196Business / Economy / Professional studies / Supply chain management / Management / Manufacturing / Computer access control / Subscriber identity module / Category management / Meter Point Administration Number / Enterprise resource planning / Supply chain

Supplier Information Management SIM ©2013 Taulia – All Rights Reserved Simplifying SIM

Add to Reading List

Source URL: www.taulia.com

Language: English - Date: 2014-06-17 23:30:38
197Hypertext Transfer Protocol / Internet privacy / Computer access control / HTTP cookie / Computing / Session / Hypertext / Computer security

Exceliance - ALOHA Load-Balancer Memo HAProxy cookie persistence methods

Add to Reading List

Source URL: www.haproxy.com

Language: English - Date: 2014-04-28 06:41:28
198Computer access control / Computing / Identity management / Federated identity / Cloud standards / Blog software / OpenID / Social networking services / LiveJournal / Movable Type / XRDS / Yadis

Brad Fitzpatrick Six Apart, Ltd. / LiveJournal / Danga August 2005 What is OpenID?

Add to Reading List

Source URL: danga.com

Language: English - Date: 2006-09-20 23:44:47
199Computer access control / Security / Prevention / Obfuscation / Password / Identity management / Cryptography / Password manager

Pico Gyazo Study – Information Sheet Who we are Pico is an ERC-funded project (grant StGbeing conducted at the University of Cambridge (UK). The Principal Investigator is Dr Frank Stajano. This study is being

Add to Reading List

Source URL: study.mypico.org

Language: English - Date: 2016-07-29 12:41:42
200Computer access control / Computer security / Cryptography / Security / Authentication / Password / Multi-factor authentication / Electronic authentication

ParentPaperwork Two Factor Authentication

Add to Reading List

Source URL: www.parentpaperwork.com

Language: English - Date: 2015-08-12 01:38:59
UPDATE