Privileged access

Results: 256



#Item
61Identity management / User provisioning software / Password / Operating system / Provisioning / BoKS / Privileged password management / System software / Software / Identity management systems

COSuser COSuser Identity Management through policy-based user provisioning, account administration, role-based access control and password synchronization – for enterprises with infrastructures using UNIX,

Add to Reading List

Source URL: www.cosuser.com

Language: English - Date: 2011-03-31 09:55:00
62Medical informatics / Health informatics / Medical technology / Healthcare / Patient safety / Medical record / Medicine / Health / Medical ethics

Revised[removed]Code of Professional Conduct for Medical Students at the University of Otago As a part of your learning, you will have privileged access to people, and to their health information. The trust that people pla

Add to Reading List

Source URL: micn.otago.ac.nz

Language: English - Date: 2013-02-18 18:46:52
63Information technology management / Password / Sudo / Superuser / Su / Privileged password management / Comparison of privilege authorization features / System administration / System software / Software

Privileged Access Usage Agreement Center for Applied Internet Data Analysis University of California, San Diego The purpose of this document is to outline the general expectations of all users given “root” access on

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:30:41
64Identity management / Cryptography / Password / Single sign-on / Password synchronization / Privileged password management / Security / Access control / Computer security

Information Security Updates Password Management Issue 13 Education Sector Updates I. Background

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2011-11-23 21:26:34
65Password / Privileged password management / Password strength / Security / Computer security / Access control

CB[removed]) For meeting on 7 January[removed]LEGISLATIVE COUNCIL PANEL ON FINANCIAL AFFAIRS

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-01-11 03:45:42
66Cyber-Ark / Malware / Principle of least privilege / Privileged Identity Management / Security information and event management / Privilege / Access control / Ring / Database activity monitoring / Computer security / Security / Computing

The CyberArk Privileged Account Security Solution A complete solution to protect, monitor, detect and respond to privileged accounts

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2014-09-04 04:59:36
67Identity management / Password / Cryptography / Cryptographic software / Password manager / Security token / Single sign-on / Keystroke logging / Privileged password management / Security / Computer security / Access control

PASSWORD MANAGEMENT February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:19
68Computer security / Login / Cryptographic software / Privileged password management / Logical security / Access control / Security / Password

Microsoft Word - 030_BFSOnline Business Manual.doc

Add to Reading List

Source URL: assets.bfs.org.au

Language: English - Date: 2013-10-28 04:32:42
69Password / User / Login / Federated identity / Comparison of privilege authorization features / Privileged password management / Computer security / Computing / Security

UI BUILDER FOR ACCESS – ENTERPRISE EDITION Security Guide VersionThis document is copyright © 2012 OpenGate Software. The information contained

Add to Reading List

Source URL: www.opengatesw.net

Language: English - Date: 2014-08-25 17:06:56
70Films / Molly & Mobarak / Documentary film

The Role of the Documentary Maker, the documentary as privileged access. Privileged access is becoming an overused term in documentary. It’s a buzzword that’s often used to hype up a promotional synopsis, trailer or

Add to Reading List

Source URL: www.tomzubrycki.com

Language: English - Date: 2013-04-01 00:23:12
UPDATE