Permissions

Results: 1263



#Item
311Cloud computing / Filesystem permissions / Chmod / Umask / File system / Apache Hadoop / Access control / Unix / Role-based access control / Computing / Software / System software

Storage Based Authorization

Add to Reading List

Source URL: hive.apache.org

Language: English - Date: 2014-01-14 13:47:37
312Filesystem permissions / Internet privacy / Facebook / Rm / Ls / Umask / Computing / Software / Web 2.0

Poster: Clarity of Facebook Connect login permissions Nicky Robinson 1. Joseph Bonneau

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
313System administration / Password / Passwd / Su / Filesystem permissions / Group identifier / YaST / Cryptographic software / Home directory / System software / Software / Unix

CHAPTER 19 Managing Users, Managing Security

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2007-11-12 08:47:42
314Embedded Linux / Smartphones / Application programming interfaces / Android / Mobile application development / Plug-in / Internet privacy / Computing / Software / Cloud clients

Enforcing Least Privilege with Android Permissions in Mobile App Development Emmanuel Bello-Ogunu, Dr. Mohamed Shehab University of North Carolina at Charlotte 9201 University Blvd Charlotte, NC 28223

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
315Number theory / Prime number / Primality test / Twin prime / Mathematics / Integer sequences / Numbers

© ATM 2007 • No reproduction except for academic purposes • for permissions WHY PLAY I SPY WHEN YOU CAN DO MATHEMATICS? Robert Andrews and Paul Andrews have some conversations

Add to Reading List

Source URL: nrich.maths.org

Language: English - Date: 2013-11-05 12:09:42
316Computing / FTP clients / News aggregators / ActiveX / Plug-in / NPAPI / CAPICOM / Software / Microsoft Windows / Internet Explorer

Setting ActiveX Permissions Open Internet Explorer Go to the Tools menu and select Internet Options You will be presented with a tabbed menu box. Click ‘Delete’ to clear the Internet Browser Cache, and select Tempor

Add to Reading List

Source URL: www.callscripter.com

Language: English - Date: 2013-03-27 07:08:25
317Copyright / Data management / Library science / Monopoly / Filesystem permissions / Law / Data / Information / Intellectual property law

DOLPHINS OF PONTA ID PROJECT TOP CATALOGUE = 81 individuals Copyright  ©  1998-­‐2013  DolphinCare.  All  rights  reserved.   This   catalogue   may   be   copied   and   used

Add to Reading List

Source URL: www.delphinschutz.org

Language: English - Date: 2014-06-04 05:53:12
318Publishing / Disability / Filesystem permissions / E-book / Media technology / Computing / Electronic publishing / Portable Document Format

Conditions of PDF Supply and Use for Visually Impaired and Disabled Persons In SAGE supplying you with free PDF of the title(s) you require, we ask that you (and/or your student) please respect the following conditions l

Add to Reading List

Source URL: www.uk.sagepub.com

Language: English - Date: 2014-05-30 10:55:03
319Filesystem permissions / Copyright / Film editing / Film / Visual arts / GarageBand

[complete and keep this form safe] You need to ask all of the people in your film to sign a release form. Adults (over 18) can sign the form themselves. Those agedyears can also sign the form themselves, but you m

Add to Reading List

Source URL: www.philosophy-of-education.org

Language: English - Date: 2015-04-15 05:49:45
320System software / Security / Access control / Computer security / Unix security / Umask / Filesystem permissions / Computing / Unix

Jan 11, 2012 Informix Database Permissions Setup The Fitrix Informix databases can be secured to allow access to tables for read permissions only. This is useful when you have configured ODBC connections for external ap

Add to Reading List

Source URL: www.fitrix.com

Language: English - Date: 2012-01-17 16:20:04
UPDATE