Data Access Manager

Results: 119



#Item
41Cyberwarfare / NTLM / LM hash / Kerberos / Pass the hash / Integrated Windows Authentication / Ticket Granting Ticket / Password / Rainbow table / Computer security / Cryptography / Computer network security

A single NT hash can be used to access almost any data which resides in a Windows domain environment. The theory behind the first practical “Pass the Hash” attack against Microsoft Windows NT and the Lan Manager (LM)

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 18:04:53
42Technology / Radio Network Controller / UMTS Terrestrial Radio Access Network / Asynchronous Transfer Mode / ATM adaptation layer / Data link layer / ATM Adaptation Layer 2 / Quality of service / ATM Forum / Network protocols / Network architecture / Computing

Flexible Line Card Design to Meet Emerging Transport Standards in the Radio Access Network. Author: Colin Alexander, C.ENG., M.IEE. European Systems Engineering Manager, Wintegra Willow House, Strathclyde Business Park,

Add to Reading List

Source URL: www.adax.com

Language: English - Date: 2012-02-10 09:10:00
43Data management / Cross-platform software / Oracle Database / Oracle Internet Directory / Oracle Corporation / PL/SQL / Oracle Enterprise Manager / Oracle Forms / Mandatory access control / Software / Computing / Relational database management systems

Oracle Label Security Administrator’s Guide

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-04-05 02:07:00
44Crime prevention / National security / Computer network security / Information security / Asset / Access control / Security / Computer security / Data security

“Advantages in defining and adopting a security policy” Information & Network Security Workshop - Bologna, 1st July 2003 Speaker: Angelo Perniola - Infosec Project Manager [removed]

Add to Reading List

Source URL: www.infosec.it

Language: English - Date: 2008-06-01 17:57:57
45OS/2 / User interfaces / Graphics software / IBM Graphical Data Display Manager / Cryptographic software / IBM / Terminal emulator / Scripting language / Host Explorer / Computing / Block-oriented terminal / Software

Quick3270 TM 3270 & 5250 Terminal Emulation Secure multi-host access for Windows® platforms

Add to Reading List

Source URL: www.it-rega.com

Language: English - Date: 2014-05-24 14:21:34
46IEEE 802.1X / Protected Extensible Authentication Protocol / Aruba Networks / Network Access Control / RADIUS / Authentication protocol / Extensible Authentication Protocol / Wireless security / Computer network security / Computing / Computer security

data sheet Aruba ClearPass Policy Manager™ The most advanced policy management platform available

Add to Reading List

Source URL: www.coolspirit.co.uk

Language: English - Date: 2014-11-18 06:00:09
47LDAP Data Interchange Format / VMware / Directory services / Lightweight Directory Access Protocol / Network architecture / Internet standards / Computing / Internet

Technical Note VMware Virtual Desktop Manager Configuration Data Export and Import VMware Virtual Desktop Manager 2.1

Add to Reading List

Source URL: www.vmware.com

Language: English - Date: 2008-06-16 20:43:05
48Software / Database management systems / MaxDB / SQL / Thread / Kernel / Database / Data Access Manager / Microsoft SQL Server / Computing / Data management / Relational database management systems

MaxDB Introduction to MaxDB Internals Version 7.6 Heike Gursch Werner Thesing

Add to Reading List

Source URL: maxdb.sap.com

Language: English - Date: 2007-11-23 04:42:09
49Public-key cryptography / Cryptographic protocols / Key management / Application programming interfaces / OPC Xi / OPC Foundation / HTTP Secure / OPC Data Access / X.509 / Automation / Technology / Computing

OPC .NET Configuration Manager Help

Add to Reading List

Source URL: www.kepware.com

Language: English - Date: 2015-02-17 11:04:03
50Encryption / Computer security / Assuria Log Manager / Ethics / AEP Netilla Secure Remote Access SSL VPN / Evaluation / Cryptography / CESG Claims Tested Mark

For further information: Paula Elliott C8 Consulting Ltd for Data Encryption Systems Ltd +[removed][removed]removed]

Add to Reading List

Source URL: download.deslock.com

Language: English - Date: 2014-05-01 10:03:18
UPDATE