Function key

Results: 1153



#Item
581Markets in Financial Instruments Directive / Law / Finance / Business / European Union directives / European Union / Financial regulation

EBA Consultation Paper on draft Guidelines for assessing the suitability of members of the management body and key function holders of a credit institution

Add to Reading List

Source URL: www.alco.lu

Language: English - Date: 2012-04-23 04:30:44
582Broadband / Digital Enhanced Cordless Telecommunications / Local loop / Software-defined radio / Headset / Telephone / NEC / Business telephone system / Function key / Technology / Electronic engineering / Telephony

[removed]05_NEC_DS_ML440_EN.indd

Add to Reading List

Source URL: www.nec-enterprise.com

Language: English - Date: 2014-11-25 08:43:43
583Control key / Computer keyboard / Mouse / Computer icon / High dynamic range imaging / Menu / Comparison of image viewers / Human–computer interaction / Computing / Computer graphics

HDRfinish 1 Index Program Function Controls

Add to Reading List

Source URL: www.doschdesign.com

Language: English - Date: 2009-10-01 08:24:15
584Threefish / Skein / NIST hash function competition / SHA-1 / SHA-2 / Tiny Encryption Algorithm / MD5 / Differential cryptanalysis / Churning / Cryptography / Error detection and correction / Cryptographic hash functions

Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE Bozhan Su, Wenling Wu, Shuang Wu, Le Dong State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Be

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-24 03:49:53
585Lock / Logarithm / X Window System / Key / Function / Locksmithing / Mathematics / Software

MEDICAL LOCK BOXES Unique & Hard-to-Find Products for the Healthcare Professional

Add to Reading List

Source URL: www.marketlab.com

Language: English - Date: 2014-02-25 11:43:07
586Computer security / Key / Two-man rule / Function key / Lock / Authorization / Computer keyboard / Key management / Security / Locksmithing / Access control

Key Control and Card Access Manual of Procedures Central Key Coordinator: The Office of Public Safety is charged with the responsibility for the efficient management of Towson University’s Key and Card Access Control P

Add to Reading List

Source URL: wwwnew.towson.edu

Language: English - Date: 2011-07-19 11:33:11
587Radio-frequency identification / Wireless / Needham–Schroeder protocol / IP / Public-key cryptography / Cryptographic hash function / Cryptography / Cryptographic protocols / Automatic identification and data capture

A Light-weight Security Protocol for RFID System.

Add to Reading List

Source URL: dl.ifip.org

Language: English - Date: 2014-08-10 19:38:24
588SHA-2 / Secure Shell / Password / Cryptographic hash function / Cryptographic software / Hash function / Crypt / Key / Cryptlib / Cryptography / Hashing / HMAC

Why is My App So Slow? (hint – it’s probably MySQL)

Add to Reading List

Source URL: doboard.com

Language: English - Date: 2009-04-24 14:18:17
589Liquid crystal display / Computer keyboards / Function key / Keypad

K3590-ADV2 4/04 Rev. A ADEMCO 6150 & 6160 REMOTE KEYPADS INSTALLATION AND SETUP GUIDE

Add to Reading List

Source URL: www.safemart.com

Language: English - Date: 2011-04-28 14:46:45
590Computer keyboards / Apple Keyboard / Function key / Serial port / Caps lock / Registered trademark symbol / Windows Mobile / Apple Inc. / Computing / Computer hardware

Thor™ VX9 Vehicle-Mount Computer Microsoft® Windows® Embedded Standard Operating System Microsoft® Windows® 7 Professional Operating System Microsoft® Windows® XP® Professional Operating System

Add to Reading List

Source URL: www.mobileidsolutions.com

Language: English - Date: 2015-01-24 12:09:38
UPDATE