Computer access control

Results: 4654



#Item
521Content-control software / Internet access / Internet censorship in China / Internet censorship / Privacy / Computer & Communications Industry Association / Internet / Net neutrality / Censorship / Great Firewall / Internet censorship in Australia

Statement of Edward J. Black President & CEO of The Computer & Communications Industry Association (CCIA) Before the

Add to Reading List

Source URL: cdn.ccianet.org

Language: English - Date: 2014-09-06 05:41:29
522Mobile technology / Computer access control / Identity management / Security Assertion Markup Language / Mobile network operator / Diameter

An Integrated Accounting and Charging Architecture for Mobile Grids Cristian Morariu, Martin Waldburger, Burkhard Stiller

Add to Reading List

Source URL: gridnets.org

Language: English - Date: 2010-08-10 03:54:15
523Computer access control / IOS / Password / Security / Webmail / IPhone / Login / Outlook.com / Email / Self-service password reset / Password fatigue

Microsoft Word - Users-guide_tcl-edits+pagination.docx

Add to Reading List

Source URL: citizensciencetahoe.org

Language: English
524Computer access control / Password / Security / Login / Phishing

Login with your username and password

Add to Reading List

Source URL: www.arcteassessment.com

Language: English - Date: 2016-04-18 13:21:17
525Public housing in the United States / Computer access control / Affordable housing / Federal assistance in the United States / Access control / Section 8 / Baltimore / Voucher / Authorization / School voucher

Housing Authority of Baltimore City Housing Choice Voucher Program Landlord Partner Portal Owner Authorization Form

Add to Reading List

Source URL: static.baltimorehousing.org

Language: English - Date: 2015-12-04 09:48:55
526Computer access control / Directory service / IP address

STARFETCH HELP Server address: IP address of the XDS receiver where files are being delivered Wildcard: File type that is being searched for (*.xml is the wildcard for Schedule Files, which are copied into the Spot Impor

Add to Reading List

Source URL: engineering.premiereradio.com

Language: English - Date: 2008-11-21 17:34:31
527Computer access control / Password / Security token / Phishing / Authentication / Challengeresponse authentication / Self-service password reset / Multi-factor authentication

Educated Guess on Graphical Authentication Schemes: Vulnerabilities and Countermeasures Eiji Hayashi Jason I. Hong

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-06 23:07:47
528Locksmithing / Perimeter security / Physical security / Access control / National security / Key management / Key / Security alarm / Lock / Authorization / Computer security / Electronic key management

Office of the President University Policy SUBJECT: Building Access Control

Add to Reading List

Source URL: www.fau.edu

Language: English - Date: 2015-11-16 11:13:19
529Internet privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Web analytics / Web browsers / Google Analytics / Point and click / Internet Explorer 8 / Safari / Google Chrome / Zombie cookie

Cookie Policy - Notice This notice is given in compliance with the obligations contemplated by Article 10 of DirectiveEC, DirectiveEC as updated by DirectiveEC, Article 13 of Legislative Decree

Add to Reading List

Source URL: www.masiero.com

Language: English - Date: 2015-06-09 11:12:22
530Computer access control / Java platform / Archive formats / Log file / JAR / Authentication / Cloud computing security / Logger / Data logger / Login / Oracle Database / Log4j

Promoting Distributed Accountability in the Cloud

Add to Reading List

Source URL: cs.mst.edu

Language: English - Date: 2015-04-03 16:07:48
UPDATE