Computer access control

Results: 4654



#Item
591Computer access control / Password / Security / Registered user / Login

Microsoft Word - User Registration Form

Add to Reading List

Source URL: bakercountyfl.org

Language: English - Date: 2015-09-30 15:46:43
592Ubiquitous computing / ISO standards / Smart cards / Access control / Computer access control / Contactless smart card / FIPS 201 / Card reader / Biometric passport / Proximity card / Radio-frequency identification / ISO/IEC 14443

Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger IBM Research Division, Thomas J. Watson Research Center PO Box 704, Yorktown Heights, NY 10598, USA

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-26 07:57:52
593Computer access control / Identity management / Federated identity / Metadata standards / Security Assertion Markup Language / Single sign-on / Identity provider / XACML / Authentication / Security token / WS-Security / SAML 2.0

Deliverable No. 3.4 Service Integration Guidelines Grant Agreement No.: 270089

Add to Reading List

Source URL: p-medicine.eu

Language: English - Date: 2013-08-09 04:11:23
594Computer access control / Certificate authorities / Public key infrastructure / Public-key cryptography / Transport Layer Security / IdenTrust / Authentication / Know your customer

Electronic Account Mgmt_State Treasurer Article 5.ai

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:46
595Liquor Control Board of Ontario / Computer access control / Password / Email / Authentication

Application Form for Access to In-Store Experience Programs System

Add to Reading List

Source URL: www.doingbusinesswithlcbo.com

Language: English - Date: 2015-04-01 13:57:17
596Payment systems / Computer access control / Online banking / E-commerce / Data security / Digipass / Mobile banking / Direct debit / Cheque / Bank / Single Euro Payments Area / Transaction authentication number

1bank Services Required Access level Menu Transaction Limits

Add to Reading List

Source URL: www.bankofcyprus.com.cy

Language: English - Date: 2016-07-05 07:31:41
597Computer access control / Wireless networking / Password / Security / Login / Wireless security / Wireless@SG

Wireless Accessing ConnSCU Internet Wireless from Macs (Revision Date: Introduction

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2013-09-18 16:04:55
598Identity management / User / Resource fork / Package manager / Computer access control / Computer security

Security Training Checklist APSCN representative conducting the training: Name of person being trained: Please initial the topics below to verify your understanding: No user will have resource codes with “Reserved”

Add to Reading List

Source URL: www.apscn.org

Language: English - Date: 2015-08-27 09:36:45
599Alphabet Inc. / Internet privacy / Web analytics / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Google Analytics / Google Search / Personally identifiable information / Google / World Wide Web / Computer security

Data protection declaration We welcome you to our website and appreciate your interest in BITKOM Servicegesellschaft mbH. BITKOM Servicegesellschaft mbH treats the protection and safety of customer or user data with the

Add to Reading List

Source URL: www.garantiesystem-altgeraete.de

Language: English - Date: 2016-04-19 07:50:53
600Identity management systems / Computer access control / Identity documents / Access control / Authentication / Notary / Identity theft / Identity verification service / Unemployment benefits / Unemployment / Email

IDENTITY VERIFICATION & AUTHENTICATION FAQ’s Question: Why do I need to prove my identity? Answer: Identity theft occurs every two seconds in America. To further protect your personal information, the District of Colum

Add to Reading List

Source URL: does.dc.gov

Language: English
UPDATE