Identity management systems

Results: 1028



#Item
171Portal software / Business / Marketing / Microsoft SharePoint / Intranet / Usability / Corporate identity / Design / Computing / Computer networks / Internet privacy / Content management systems

CM BRIEFING CMB 2012–02 Briefing a visual design agency for intranet

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2012-09-20 02:00:06
172Electrical grid / Identity management / Electromagnetism / Electricity / Force / Electric power distribution / Electric power transmission systems / Eskom

Insert image here Grid Access Unit Update MarchInsert image

Add to Reading List

Source URL: www.sawea.org.za

Language: English - Date: 2013-04-10 08:29:48
173Relational database management systems / Lieberman Software / Privileged Identity Management / Oracle Database / System Center Operations Manager / Linux / Application software / System Center Configuration Manager / Privileged password management / Software / Cross-platform software / Computing

» GROUP TEST l IdM, NAC & DLP Lieberman Software Enterprise Random Password Manager L

Add to Reading List

Source URL: www.liebsoft.com

Language: English - Date: 2012-12-06 13:32:41
174Social issues / Science / Privacy / Law / Information security / Design science / Health Insurance Portability and Accountability Act / National Security Agency / Information privacy / Ethics / Security / Identity management

Call for Papers: European Journal of Information Systems (EJIS) Special Issue on Security and Privacy in 21st Century Organisations Special Issue Editors: Paul Benjamin Lowry, City University of Hong Kong, China, Paul.Lo

Add to Reading List

Source URL: www.palgrave-journals.com

Language: English
175Information systems / User profile / German National Library of Economics / Internet privacy / Mendeley / Content management system / Computing / Information science / Software / Identity management / Recommender system

Timo Borst – Tamara Pianos - Christin Seifert EEXCESS - Toolbox for managing and disseminating digital library content EEXCESS (eexcess.eu) is an EU-funded project with many international partners like Mendeley, Collec

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
176Computer security / Identity management / Card reader / Wiegand interface / RS-485 / CompactFlash / Security / Access control / Computer hardware

Systems | AMC2 - Access Modular Controller AMC2 - Access Modular Controller ▶ Intelligent access manager for one to eight entrances ▶ Four interfaces include the reader power supply ▶ Standard 2 GB compact flash

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2010-08-04 05:02:39
177Pedagogy / Community building / Community of practice / Management / Identity / Culture / Social learning / Community / E-learning / Education / Knowledge / Educational psychology

Communities  of  practice  and  social  learning  systems:     the  career  of  a  concept   Etienne Wenger The concept of community of practice was not born in the systems theory t

Add to Reading List

Source URL: wenger-trayner.com

Language: English - Date: 2012-01-29 14:51:20
178Computer security / Software / OAuth / Identity management / Identity management systems / OpenID / Play Framework / Distributed social network / Computing / Cloud standards / Federated identity

Book Reviews most important question when studying STAs in virtual environments is whether a particular player is capable of transitioning from a virtual space to the real world. Although some of the essays in Vice

Add to Reading List

Source URL: www.journalofplay.org

Language: English - Date: 2014-06-25 10:30:26
179Computer security / Software / OAuth / Identity management / Identity management systems / OpenID / Play Framework / Distributed social network / Computing / Cloud standards / Federated identity

Venn technology decision tree   The HEART WG is mainly about profiling three technologies: OAuth, OpenID Connect, and  UMA. OAuth is a “base” technology. OpenID Connect is built on top of O

Add to Reading List

Source URL: openid.net

Language: English - Date: 2015-03-21 15:09:12
180Access control / System software / Identity management systems / Cryptographic software / Password strength / Password policy / Password / Keychain / Security

Guidelines to change your password before its expiry date If after having gone through these guidelines you are still experiencing difficulties with changing your password, please contact the Helpdesk: By Telephone: 020

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-05-02 02:28:08
UPDATE