Computer access control

Results: 4654



#Item
941Cybernetics / Science / Computer security / Control engineering / Hacking / Access control / Cyberwarfare / Controller / Control system / Technology / Security / Automation

Paper Title (use style: paper title)

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:47
942Computer memory / Computer architecture / Cache coherency / Parallel computing / Concurrency / Spinlock / Readers-writers problem / Test-and-set / Non-Uniform Memory Access / Computing / Concurrent computing / Concurrency control

Administrivia • Project 1 due right now - Free extension if you are here - Of for SCPD students who watch lecture before midnight • To get extension

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-02-19 22:26:45
943Telecommunications / Single sign-on / Access control / IBM Tivoli Access Manager / Web Access Management / Computer security / Security / Provisioning

Case Study Professional Services Persistent Systems improves a large bank’s Data Security by providing Centralized Authentication Management Solution

Add to Reading List

Source URL: www.persistent.com

Language: English - Date: 2015-01-29 00:13:56
944National Security Agency / Security-Enhanced Linux / Windows NT architecture / Mandatory access control / Type enforcement / FLASK / Role-based access control / Multilevel security / Capability-based security / Computer security / Security / Access control

Integrating Flexible Support for Security Policies into the Linux Operating System Peter Loscocco, NSA, Stephen Smalley, NAI Labs, Abstract The protection mechanisms of current mai

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:13
945Computer networking / Ethernet / Data transmission / Packet switching / Computer network / Throughput / Media access control / MAC address / Network packet / Computing / Data / Information

Administrivia • Project 3 due Thursday - As usual, due at 4:15pm - Extension to midnight if you come to class - For longer extensions, please email cs140-staff

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-02-23 18:50:56
946Software / Common Criteria / Mandatory access control / National Information Assurance Partnership / Evaluation Assurance Level / Linux kernel / Security-Enhanced Linux / Linux / Protection Profile / Computer security / Evaluation / Computing

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
947Card reader / USB / Access control / Wiegand / HID Global / Magnetic stripe card / MIFARE / Universal Serial Bus / Punched card input/output / Computer hardware / Security / Computing

SBR 0812 – USB Desktop Reader Flex Design for easy registration of proximity access cards in access control software. The card reader interface connects to a pc via USBand the required driver is automatically lo

Add to Reading List

Source URL: www.securityengineering.dk

Language: English - Date: 2015-01-26 15:33:47
948Internet protocols / Two-factor authentication / Single sign-on / RADIUS / Authentication / Password / Multi-factor authentication / Extensible Authentication Protocol / Identity management / Security / Computer security / Access control

C OD E42 T E C HN O LO GY N OT E Two-factor Authentication Increases security, decreases risk

Add to Reading List

Source URL: essentials.code42.com

Language: English
949Identity management systems / Password / Single sign-on / Imprivata / Identity management / Password manager / Password synchronization / Computer security / Security / Access control

A FINANCIAL SUCCESS STORY jUSTICE FEDERAL CREDIT UNION Imprivata OneSign® Empowers Justice Federal Credit Union to Ensure Highest Levels of Security and Productivity The Business Challenge

Add to Reading List

Source URL: www.tentonmarketing.com

Language: English - Date: 2014-12-18 09:45:00
950Crime prevention / Security engineering / Criminology / Crime prevention through environmental design / Door / Defensible space theory / Computer security / Safety / Access control / Security / National security / Public safety

14 smarthousing Towards Sustainable Housing For further information on

Add to Reading List

Source URL: checkmyhome.com.au

Language: English - Date: 2014-06-24 20:59:15
UPDATE