Control system security

Results: 2384



#Item
931Content-control software / DansGuardian / Computer security / Spam filtering / Electronic filter / Filter / Water filter / Blacklist / System software / Software / Computing

Open Source Internet Filtering John Brice Meadville Public Library What is Open Source?

Add to Reading List

Source URL: meadvillelibrary.org

Language: English - Date: 2003-11-07 13:49:09
932Identification / Surveillance / Access control / Fingers / Human anatomy / Integrated Automated Fingerprint Identification System / National Institute of Justice / Live scan / Fingerprints / Biometrics / Security

Contactless Fingerprint Technologies Assessment (Version 2)

Add to Reading List

Source URL: www.ncjrs.gov

Language: English - Date: 2014-02-24 12:50:51
933Computer file / Folder / Software / File managers / Repair permissions / Unix security / System software / Computing / Filesystem permissions

Microsoft Word - Permissions and Access Control in CmapTools.doc

Add to Reading List

Source URL: cmap.ihmc.us

Language: English - Date: 2015-01-08 11:12:31
934Password / Security / Blackboard system / Login / Access control / Blackboard Inc. / Self-service password reset / Education / Distance education / Educational technology

BLACKBOARD LOGIN There are many ways to log into Blackboard. Via sf.edu From the University of Saint Francis home page at www.sf.edu, you can simply click on the Blackboard

Add to Reading List

Source URL: www.sf.edu

Language: English - Date: 2011-07-27 15:45:34
935Computer security / Identity management / Card reader / Transmitter / Telephone / Technology / Security / Access control

TM AE2000Plus The Ultimate in Telephone Entry. A multi-tenant system

Add to Reading List

Source URL: www.rsdoors.com

Language: English - Date: 2008-08-27 18:23:35
936Windows Vista / Device drivers / Windows Server / Windows NT / Windows / User Account Control / Printer driver / Group Policy / HP Universal Print Driver / Microsoft Windows / Software / System software

Point and Print Security on Windows Vista - 2 Point and Print Security on Windows Vista Updated June 12, 2008

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-06-12 13:28:22
937Downtime / Database security / Information technology / Project management / Knowledge / System administration / Patch / Software maintenance

Virtual Patching and Database Security: An Effective Compensating Control Patching promptly is part of highly effective approaches to managing vulnerabilities, but patching is not always practical or even possible — wh

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:00
938Security token / One-time password / Two-factor authentication / Internet protocols / Computer network security / Multi-factor authentication / Password / Authentication / RADIUS / Security / Computer security / Access control

Token-less OTP Authentication Solutions © 2007 – 2015 SyferLock Technology Corporation™ All Rights Reserved. System and Method U.S. Patent nos. 7,143,440 & 7,725,712 Additional U.S. and Foreign Patents and Patents P

Add to Reading List

Source URL: www.syferlock.com

Language: English - Date: 2015-01-22 10:04:27
939Reconciliation / Internal control / Information security audit / Internal audit / Finance / Audit / Auditing / Information technology audit / Business

The University of Texas System Audit Office Audit of Financial Controls at Selected University of Texas System Administration Offices FY[removed]May 2014

Add to Reading List

Source URL: www.utsystem.edu

Language: English - Date: 2014-08-28 16:36:18
940Technology / Quality / Fault tolerance / Data synchronization / Control engineering / Byzantine fault tolerance / Fault-tolerant system / Fault-tolerant design / Trace / Computing / Fault-tolerant computer systems / Security

LNCS[removed]Beyond Traces and Independence

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-10 19:07:42
UPDATE