Computer access control

Results: 4654



#Item
861Economy / Computer access control / Stock market / Finance / Access control / Authentication / Notary / Packaging / Deposit account / Security / Smart card

WDB-eBanking-Bedingungen_PK_DE_EN.indd

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2015-10-06 05:34:23
862Internet privacy / Hypertext Transfer Protocol / World Wide Web / Computing / Computer access control / HTTP cookie / Digital media / Google Analytics / Privacy / Session / Zombie cookie / Secure cookies

COOKIES POLICY – Extended statement What are cookies? Cookies are small text strings that the websites visited send to the devices, where they are stored and relayed once the user visits the website again. Cookies may

Add to Reading List

Source URL: mymoleskine.moleskine.com

Language: English - Date: 2015-08-06 05:23:01
863Software / Computing / Computer access control / Computer security / Hacking / Social engineering / User interface techniques / Security / Cross-site request forgery / Cross-site scripting / Phishing / Clickjacking

A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
864Network architecture / Emerging technologies / Configuration management / Software-defined networking / Network protocols / OpenFlow / American brands / Access control / Computer network / Cisco Systems / Network switch / Hewlett Packard Enterprise Networking

Authentication for Resilience: the Case of SDN Dongting Yu1 , Andrew W. Moore1 , Chris Hall2 , and Ross Anderson1 1 Computer Laboratory, University of Cambridge 2

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-12-20 08:55:40
865Computer access control / Prevention / Access control / Software / Password / Security / Form / Login

Crea%ng  an  Incoming  Exchange   Applica%on     1.  Click  on  the  hyperlink  for  the  University  of  

Add to Reading List

Source URL: www.studyabroad.illinois.edu

Language: English - Date: 2015-09-17 16:42:41
866Technology / Computer security / Computer access control / E-commerce / Economy / Certificate authorities / Mobile technology / Entrust / Datacard Group / Mobile device management / Multi-factor authentication / Security token

+entrust.com/mobile Mobile Security Solutions Securing Mobile Identities, Devices

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2016-01-14 11:24:30
867

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:24
    868Computing / Software / Computer access control / Academic publishing / Andrew W. Mellon Foundation / Federated identity / Ithaka Harbors / Proxy server / Authentication / Android / Shibboleth / Project MUSE

    LOGIN PASSWORD ISSUE BRIEF Meeting Researchers

    Add to Reading List

    Source URL: www.sr.ithaka.org

    Language: English - Date: 2015-09-27 15:59:43
    869

    Portable and Flexible Document Access Control Mechanisms? Mikhail Atallah, Marina Bykova Computer Sciences Department and CERIAS Purdue University {mja,mbykova}@cs.purdue.edu

    Add to Reading List

    Source URL: www.cse.nd.edu

    Language: English - Date: 2007-08-02 16:59:37
      870Economy / Finance / Money / Online banking / E-commerce / Computer access control / Payment systems / Bank / Federal Deposit Insurance Corporation / Password / SiteKey / Transaction account

      Online Banking User Guide Signing Into Online Banking Open your web browser and go to www.alpinebank.com. Enter your Alpine Online® ID, and click on the Login button.

      Add to Reading List

      Source URL: www.alpinebank.com

      Language: English - Date: 2013-12-31 13:32:04
      UPDATE