Computer access control

Results: 4654



#Item
481Computer access control / Cyberwarfare / Hacking Team / Spyware / Surveillance / Internet Explorer / Adobe Flash Player / POODLE / Common Vulnerabilities and Exposures

ESET_Logo_HorizontalClaim-White

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2016-01-22 06:05:11
482Access control / Identity management / Health informatics / Computer access control / Integrating the Healthcare Enterprise / Medical technology / XACML / Authorization / Privacy policy / PERMIS / Privacy / Vendor Neutral Archive

IHE IT Infrastructure Technical Framework White Paper - Access Control

Add to Reading List

Source URL: www.ihe.net

Language: English - Date: 2009-09-24 16:22:19
483Cloud standards / Computer access control / Software architecture / OAuth / Java platform / Instant payment notification / Web API / Play Framework / Representational state transfer / IBM API Management / OpenID Connect

Squeezol API RESTfulSplit as a Service Ing. Davide Costa, Ing. Fabio Fiori 11 Luglio 2016

Add to Reading List

Source URL: www.squeezol.com

Language: English - Date: 2016-07-11 08:13:27
484Computer network security / Network file systems / Linux Professional Institute Certification / Directory services / Virtual private networks / Computer access control / FreeIPA / Kerberos / Server Message Block / Active Directory / Apache HTTP Server / Security-Enhanced Linux

 LPIC-3: Linux Enterprise Professional Certification LPIC-3 303: Security

Add to Reading List

Source URL: www.futurecert.com

Language: English - Date: 2016-07-22 03:13:26
485World Wide Web / Internet protocols / Computer access control / Form / HTML / Hypertext Transfer Protocol / Liability and student records

Microsoft Word - Security Request Form_SPD

Add to Reading List

Source URL: registrar.missouri.edu

Language: English - Date: 2014-12-14 16:35:02
486Mobile phones / Mobile telecommunications / Smartphones / Computer access control / Subscriber identity module / TAG Heuer / Dual SIM / Motorola Fone / Nokia Asha 310

MERIDIIST - Full User Guide English

Add to Reading List

Source URL: customer-service.tagheuer.com

Language: English - Date: 2014-08-07 08:42:37
487Hypertext Transfer Protocol / Internet privacy / World Wide Web / Computer access control / HTTP cookie / Lancaster /  Pennsylvania / Internet forum / Lancaster /  Texas / Session / User / P3P

GENERAL We collect NO personal information like names or addresses when you visit our website. If you choose to provide that information to us it is only used to fulfill your request for information. We do collect some

Add to Reading List

Source URL: www.lancastereventcenter.com

Language: English - Date: 2016-08-19 12:42:09
488Directory services / Computer access control / Internet Standards / Java platform / Lightweight Directory Access Protocol / Java Authentication and Authorization Service / OpenLDAP / PERMIS / Authentication / LDAP Data Interchange Format

Authentication and Authorization Authentication and Authorization Authentication and Authorization Authentication and Authorization Authentication and Authorization

Add to Reading List

Source URL: ics-web.sns.ornl.gov

Language: English - Date: 2011-08-17 15:52:16
489Packaging / Computer access control / Cryptography / ISO standards / Ubiquitous computing / Smart card / Patent claim / Authentication / Public-key cryptography / Tamper resistance

USOO5276736A United States Patent]

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:27
490Identity management / Federated identity / Computer access control / Access control / Computer security / Identity theft / GlobalSign / Authentication / Identity provider / Internet privacy / Digital identity

Trusted Identities Foundational to Cloud Services LILA KEE CHIEF

Add to Reading List

Source URL: res.cdn.sys-con.com

Language: English - Date: 2016-06-30 11:05:14
UPDATE