Computer access control

Results: 4654



#Item
991Access control / Secure state / Trusted system / Multilevel security / Security / Computer security / Bell–LaPadula model

A Security Model for Military Message Systems: Retrospective Carl E. Landwehr Mitretek Systems, Inc. Constance L. Heitmeyer Naval Research

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2012-01-27 15:46:35
992Ethernet / IEEE 802.3 / Media Access Control / Fiber-optic communications / Optical Internetworking Forum / 100 Gigabit Ethernet / Ethernet over twisted pair / Multiplexer / IEEE / OSI protocols / Computer hardware / Computing

IA OIF-MLGMulti-link Gearbox Implementation Agreement IA # OIF-MLG-02.0

Add to Reading List

Source URL: www.oiforum.com

Language: English - Date: 2013-05-02 12:59:39
993National accounts / Concurrency control / Lock / Gross domestic product / Access control / Password / Security engineering / Security / Computer security

UNITED STATES DEPARTMENT OF COMMERCE Economics and Statistics Administration BUREAU OF ECONOMIC ANALYSIS Washington, D.C.

Add to Reading List

Source URL: bea.gov

Language: English - Date: 2015-03-17 15:51:55
994Computing / Networking hardware / Electronic engineering / Computer network security / Content-control software / Fortinet / Power over Ethernet / IEEE 802.3 / Wireless access point / Ethernet / OSI protocols / IEEE standards

Gigabit PoE Injector PRODUCT DATASHEET Remote Power feeding made easy The single port GPI-115 Power over Ethernet (PoE) injector offers a compact and cost- effective, fully IEEE

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:32
995Prevention / Identity management / Certification Commission for Healthcare Information Technology / CCOW / Information technology security audit / Access control / Password / Audit trail / Kerberos / Security / Computer security / Public safety

Instructions: Check the appropriate column to indicate the application’s security capabilities. Please provide any additional responses or detailed explanations of other compensating controls as comments. Please numbe

Add to Reading List

Source URL: www.himss.org

Language: English - Date: 2013-02-13 10:28:31
996Password / Phishing / Two-factor authentication / Password strength / Password policy / Security / Access control / Computer security

Account Security One of the easiest ways to lose control of private information is to use poor safeguards on internet accounts like web-based email, online banking and social media (Facebook, Twitter). People make mistak

Add to Reading List

Source URL: rebootpeterborough.ca

Language: English - Date: 2013-04-28 04:02:58
997Computer security / Cyberwarfare / Crime prevention / National security / Network security / Information security / Internet security / Firewall / Access control / Computer network security / Security / Data security

Cyber & Information a s s u ra n c e Land Mobile Radio System Product & Services Offerings

Add to Reading List

Source URL: pspc.harris.com

Language: English - Date: 2014-05-22 09:41:34
998Computing / Telecommunications engineering / Content-control software / Fortinet / Networking hardware / IEEE 802.11 / Wi-Fi / Wireless security / MIMO / Technology / Computer network security / Wireless networking

FortiAPTM-221B and 223B Integrated Wireless Security and Access The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without c

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:19
999Two-factor authentication / Multi-factor authentication / Password / Biometrics / Authentication / Identity management / Mobile business intelligence / Security token / Security / Access control / Computer security

Microsoft Word - m170 - Delfigo provides business value through multi-factor biometric mobile security

Add to Reading List

Source URL: delfigosecurity.com

Language: English
1000Federated identity / Single sign-on / Password / Identity management / Computer security / Security / Access control

Single Sign-On Release Information FAMIS Post-Conference Workshop June 26, 2013

Add to Reading List

Source URL: www.famisonline.org

Language: English - Date: 2013-06-26 15:58:09
UPDATE