Computer access control

Results: 4654



#Item
281Computer access control / Computing / Cloud standards / Computer security / OAuth / Access token / Token coin / Token / Federated identity

Application name Concur contact

Add to Reading List

Source URL: developer.concur.com

Language: English - Date: 2016-08-15 15:53:27
282Microsoft / Computer access control / Computing / Webmail / Email / Password / Login / Outlook.com / Microsoft account / Self-service password reset

Dealer Licensing Online Services Administrative User/User set up through ODPS Identity Manager

Add to Reading List

Source URL: www.publicsafety.ohio.gov

Language: English - Date: 2015-09-28 07:03:37
283Software / Utility software / System software / Bioinformatics / Pubget / Search engine software / Computer access control / Password / Login / Expect

PUBGET and the WORLDCAT KNOWLEDGE BASE Implementation from the Serials/E-Resources perspective The main benefit for using Pubget for ILL Direct Request for Articles: Pubget automatically updates the WorldCat Knowledge Ba

Add to Reading List

Source URL: www.vivalib.org

Language: English - Date: 2013-10-24 12:25:42
284Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / World Wide Web / Computing / Hypertext

Cookies This site uses cookies to offer you a better browsing experience. Find out more on how we use cookies and how you can change your settings . Mr. Placencia, Carlos Architect

Add to Reading List

Source URL: policytransfer.metropolis.org

Language: English - Date: 2016-08-22 00:53:59
285Computing / Software / Computer access control / Identity management / Free software / Java platform / Java enterprise platform / ForgeRock / OpenAM / OpenIDM / OpenDJ / Educational technology

UNIVERSITY DATASHEET School of (Forge)Rock Determining how to architect, build and deploy your open-source identity solution can be a complex

Add to Reading List

Source URL: www.forgerock.com

Language: English - Date: 2016-02-29 13:17:27
286Computer access control / Pharmaceutical industry / Validity / Authentication / Notary / Packaging / Validation / Business / Computer security / Security

UCD Activities and Progress 2014–11–18 Mark Rose and Rich Keller PDS User Centered Design

Add to Reading List

Source URL: mgmt.pds.nasa.gov

Language: English - Date: 2014-11-18 09:37:20
287Food and drink / Cookies / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet privacy / Mug

FINAL EXAMINATION INTRODUCTION TO INTELLECTUAL PROPERTY Paul Ohm December 15, 2007 Instructions: Please read these instructions carefully before proceeding.

Add to Reading List

Source URL: paulohm.com

Language: English - Date: 2008-11-20 13:19:32
288Computer access control / Access control / Prevention / Computer security / Password / Security / Registered user / Login

REGISTRATION AGREEMENT TO VIEW RECORDS ONLINE JEFFERSON COUNTY CLERK OF COURT REQUEST FORM: *Registered User Name: *E-mail Address *Address *City/State/Zip

Add to Reading List

Source URL: jeffersonclerk.com

Language: English - Date: 2016-05-16 09:26:53
289Computer security / Security / Prevention / Computer access control / Pre-boot authentication / USB flash drive / Authentication / Trusted Platform Module / Password / Acer N50 / Disk encryption

Acer ProShield The Acer ProShield suite of essential security and manageability tools allows you to manage your security applications. Create encrypted personal secure drives and add extra layers of protection to keep yo

Add to Reading List

Source URL: static.acer.com

Language: English - Date: 2013-10-24 05:13:45
290Computer security / Security / Computer access control / Cyberwarfare / Identity theft / Cybercrime / Computer network security / Rogue software / Spyware / Password / Multi-factor authentication / Phishing

Tips on Online Security Security Practices to Safeguard Your Password You are advised to adopt the following: • • •

Add to Reading List

Source URL: secure.ifastnetwork.com

Language: English - Date: 2014-09-25 22:08:54
UPDATE