Digital identity

Results: 1391



#Item
681Electronic documents / Web development / Electronic signature / Digital signature / Electronic commerce / Public key certificate / Email / Identity theft / Cryptography / Key management / Public-key cryptography

M PRA Munich Personal RePEc Archive Important Concepts in Iranian Electronic Commerce Law Ehsan Zar Rokh

Add to Reading List

Source URL: mpra.ub.uni-muenchen.de

Language: English - Date: 2013-02-11 14:54:03
682Internet privacy / Digital media / Identity management / Social issues / P3P / World Wide Web / Privacy policy / Information privacy / Gmail / Computing / Privacy / Ethics

Usage Restriction Management for Accountable Data Transfer on the Web Oshani Seneviratne and Lalana Kagal Decentralized Information Group MIT Computer Science and Artificial Intelligence Lab {oshani, lkagal}@csail.mit.ed

Add to Reading List

Source URL: dig.csail.mit.edu

Language: English - Date: 2011-03-01 08:07:27
683Mobile technology / Mobile telecommunications / GSM / General Packet Radio Service / Circuit Switched Data / Wireless modem / Cellular network / Integrated Digital Enhanced Network / Subscriber identity module / OSI protocols / Technology / Modems

IMMS-CELL-GSM Cellular Communications Kit Installation Instructions ®

Add to Reading List

Source URL: www.hunterindustries.com

Language: English - Date: 2011-09-02 19:05:34
684Time / Electronic signature / Digital signature / Public key certificate / Identity document / Criminal record / Timestamp / Cryptography / Key management / Public-key cryptography

Factsheet on extracts from the Register of Criminal Convictions Legal basis Art. 371 para. 1 Swiss Criminal Code (SCC): Any person may request the Swiss Central Register of Convictions to issue a written extract from the

Add to Reading List

Source URL: www.e-service.admin.ch

Language: English - Date: 2014-05-16 09:10:54
685Academia / Bellevue University / Bellevue /  Nebraska / North Central Association of Colleges and Schools / Bellevue College / Middle States Association of Colleges and Schools / DePaul University College of Computing and Digital Media / Grantham University / Council of Independent Colleges / Higher education / Geography of Florida

Bellevue University – 40th Anniversary Table of Contents The University Identity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.bellevue.edu

Language: English - Date: 2013-11-14 11:32:48
686Photo sharing / Pinterest / Web 2.0 / Twitter / World Wide Web / Digital media / Image hosting

Kids & Pros Unveils New Website and Brand Identity Revamp Includes New Look, New Graphics, New Registration Process, Social Media Plug Ins and New Photo Galleries on kidsandpros.com For Release January 30, 2014 – Kids

Add to Reading List

Source URL: www.grunduskigroup.com

Language: English - Date: 2014-01-30 09:48:38
687Personal finance / United States bankruptcy law / Identity theft / Digital media / Anti-theft system / Grand Theft Auto IV / SurePath Financial Solutions / Security / Crime / Credit counseling

FOR MORE INFORMATION: Thomas Nitzsche | [removed]ext. 2675| [removed[removed] | www.ClearPointCCS.org

Add to Reading List

Source URL: www.clearpointcreditcounselingsolutions.org

Language: English - Date: 2015-01-16 11:13:19
688Mobile telecommunications / Mobile phones / Information technology audit / Mobile device forensics / Cellebrite / Microsoft Kin / Integrated Digital Enhanced Network / International Mobile Equipment Identity / Subscriber identity module / Technology / Mobile technology / Electronic engineering

Microsoft Word - Mobile Device Forensic Process v3.0.doc

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-05-14 11:39:38
689Psychology / Education / Creativity / Mihaly Csikszentmihalyi / Howard Gardner

The App Generation How Today’s Youth Navigate Identity, Intimacy, and Imagination in a Digital World Howard Gardner and Katie Davis No one has failed to notice that the current generation of youth is deeply —some wou

Add to Reading List

Source URL: thrivebyfivewa.org

Language: English - Date: 2014-12-10 18:41:13
690Credit cards / Computing / Crimes / Identity theft / Theft / Data breach / Cyberwarfare / Credit card fraud / Credit card / Security / Computer security / Data security

Stop the Data Thief in his Tracks! In today’s digital world, the storefront small business generates, processes, and stores data in ways never before imagined. And, the data your customers entrust to you equals profita

Add to Reading List

Source URL: www.mydigitalshield.com

Language: English - Date: 2014-07-06 16:44:19
UPDATE