Computer access control

Results: 4654



#Item
391Internet privacy / World Wide Web / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Internet marketing / Information privacy / Marketing / Computer security / Web analytics / Opt-out / Targeted advertising

Cookies and privacy Use of cookies by www.f4f.com Cookies are small text files that are placed on your computer by websites that you visit. They are widely used in order to make websites work, or work more efficiently, a

Add to Reading List

Source URL: www.f4f.com

Language: English - Date: 2016-02-10 08:14:44
392Computer security / Security / Access control / Computer access control / Role-based access control / Identity management / PERMIS / JavaOne / NIST RBAC model

CON 2324 A Practical Guide to Role Engineering Shawn McKinney October 27, 2015 JavaOne

Add to Reading List

Source URL: iamfortress.files.wordpress.com

Language: English - Date: 2016-07-28 18:23:00
393Computer access control / Computer security / Federated identity / Identity management / Cloud standards / OpenID / Authentication / Single sign-on / Identity provider / Password / Information Card / OAuth

An Investigation into a Usable Identity Binding Service Tristan Lewis William Kim Jill L. Drury

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:32
394Computer access control / Computer security / Cryptography / Security / Password / Login / Authentication / Identity management

Unit 1:Orientation to SAMS

Add to Reading List

Source URL: stateaid.nysed.gov

Language: English - Date: 2015-09-08 15:10:19
395Security / Computer security / Computing / Cryptography / Computer access control / E-commerce / Computer network security / National security / Single sign-on / Authentication / Encryption / Cloud computing security

OS_IIR_CloudSecurity_Infographic_v6

Add to Reading List

Source URL: oneshield.com

Language: English - Date: 2016-06-30 14:58:41
396Identity document / Barcode / Packaging / Computer access control / Identity management / Communication / Card reader

NEW SECURE CARD FEATURES The new design incorporates cutting-edge security and other features, including: Polycarbonate Card Body

Add to Reading List

Source URL: www.mva.maryland.gov

Language: English
397Internet privacy / Computing / Computer security / Microsoft / Computer access control / Hypertext Transfer Protocol / Privacy / Identity documents / HTTP cookie / Information privacy / Personally identifiable information / Single sign-on

  Castle Software, Inc. Data Privacy & Security Policy Castle Software, Inc. ("Castle") is committed to protecting the privacy of its users. Because  Castle gathers certain types of information abou

Add to Reading List

Source URL: www.castlelearning.com

Language: English - Date: 2015-09-17 09:11:17
398Mobile telecommunications / Technology / Mobile technology / Wireless / Mobile phones / Computer access control / Subscriber identity module / Near field communication

SIMalliance_infographic_2015

Add to Reading List

Source URL: simalliance.org

Language: English - Date: 2015-04-14 04:47:51
399Microsoft / Computer access control / Computing / Federated identity / Educational software / PowerSchool / Password / Single sign-on / Email / Outlook.com

Parent Single Sign-On Quick Reference Guide for PowerSchool 8.x

Add to Reading List

Source URL: www.sau50.org

Language: English - Date: 2014-11-03 14:49:42
400E-commerce / Secure communication / Computer access control / Tickets / Password / HTTP cookie / Transport Layer Security / Computer security

Data Security Data protection declaration for online ticket shop: The ordering of tickets via the Internet represents a new variation of ticket purchase for our customers. These now have the opportunity of ordering the d

Add to Reading List

Source URL: shop.wienerlinien.at

Language: English - Date: 2015-07-27 08:05:12
UPDATE