Computer access control

Results: 4654



#Item
341Access control / Security / Computer security / Computer access control / Role-based access control / File system / Lattice-based access control / Computer file / Access control list

 DISIͲViaSommarive14Ͳ38123PovoͲTrento(Italy) http://www.disi.unitn.it RELATION BASED ACCESS

Add to Reading List

Source URL: disi.unitn.it

Language: English - Date: 2014-09-10 09:40:14
342Microsoft / Software / Computer access control / Computing / Password / Security / Outlook.com / Login / Form

Student Registration and Login Information Log on. Tune in. Succeed. Your steps to success. STEP 1: Register

Add to Reading List

Source URL: media.pearsoncmg.com

Language: English - Date: 2008-12-29 18:31:29
343Computer security / System software / Software / System administration / Windows Vista / Privilege / Operating system / Superuser / National Security Agency / Computer access control / Comparison of privilege authorization features / Security and safety features new to Windows Vista

US Patent #7,945,947 NSA Reference #1577 AVAILABLE FOR LICENSING Local Administrative Privileges

Add to Reading List

Source URL: arrowheadcenter.nmsu.edu

Language: English - Date: 2016-04-07 13:58:12
344Access control / Prevention / Password / Security / Computer access control / Login / Academic term / Case sensitivity

OASIS Student User’s Manual Online Academic Student Information System by

Add to Reading List

Source URL: www.benedictine.edu

Language: English - Date: 2016-06-28 18:35:34
345Computer access control / Cryptography / Obfuscation / Password / Security / Challengeresponse authentication / Crypt / Microsoft Word / Draw a Secret / Password cracking

Microsoft Word - 29_Paper.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-05-30 20:35:30
346Computer access control / Obfuscation / Prevention / Password / Security / System administration / Cryptography / Identity management / Password policy / Password notification email

Arkansas Department of Education, in conjunction with Arkansas Legislative Audit Active Directory Password Configuration and Requirements for state applications (AFEU, Child Nutrition, Cognos, Direct Certificati

Add to Reading List

Source URL: adedata.arkansas.gov

Language: English - Date: 2016-08-03 15:10:48
347Computing / Computer security / Cyberwarfare / Cryptographic protocols / Secure communication / Computer network security / Internet protocols / Computer access control / Cross-site scripting / Cheat sheet / Cross-site request forgery / Cheating in video games

OWASP Cheat Sheets Martin Woschek, April 9, 2015 Contents I

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-23 16:03:46
348Software / Free software / Computer access control / Login / Password / Firefox

Instructions for the German Test WS 2016final

Add to Reading List

Source URL: www.stk.kit.edu

Language: English - Date: 2016-07-28 10:05:35
349Computer access control / Access control / Authentication / Notary / Packaging / Usability / Computer security / Security / Universal Plug and Play

Threshold Things That Think: Usable Authorisation for Resharing [Poster Abstract SOUPS.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-06 23:02:05
350Computer access control / Computer security / Computing / Electronic authentication / Security token / Authentication / Multi-factor authentication / OpenID / RSA SecurID / Mutual authentication / OAuth / SQRL

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann  Markus Hertlein  Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertl

Add to Reading List

Source URL: www.xignsys.com

Language: English - Date: 2016-03-13 15:17:18
UPDATE