Security token

Results: 1367



#Item
611Password / Data security / Security token / Information security / Access control / Password policy / Privileged password management / Security / Identity management / Computer security

UTMB INFORMATION RESOURCES PRACTICE STANDARD Section 1 Subject 2 Security Management Access Management

Add to Reading List

Source URL: www.utmb.edu

Language: English - Date: 2009-07-09 10:25:18
612Computer security / Password / Information security / Security token / Malware / Computer virus / Password manager / Email privacy / Security / Computing / Email

INFORMATION RESOURCES ACCEPTABLE USE POLICY

Add to Reading List

Source URL: www.uttyler.edu

Language: English - Date: 2010-09-03 05:58:18
613Key management / Public key infrastructure / Computer security / Smart card / Cyberwarfare / Identity management / Security / Security token / Public-key cryptography / Ubiquitous computing / ISO standards

charismathics_Claim_may2008 neu

Add to Reading List

Source URL: www.charismathics.com

Language: English - Date: 2012-12-15 20:53:50
614Access token / Computer security / Token coin

Online Scenario I: Blood in the Shadows This is the first official online scenario for DOOM: THE BOARDGAME. It is designed to be shorter and play more quickly than those included in the Scenario Guide. It is not intended

Add to Reading List

Source URL: www.fantasyflightgames.com

Language: English - Date: 2012-08-28 19:17:14
615Wireless / Identity document / Biometrics / Radio-frequency identification / Biometric passport / Security token / Protection Profile / Framework Programmes for Research and Technological Development / Schengen Area / Security / National security / Data security

Technical challenges for identification in mobile environments Klaus Keus Jan Löschner EUR[removed]EN[removed]

Add to Reading List

Source URL: publications.jrc.ec.europa.eu

Language: English - Date: 2012-04-17 06:11:15
616Two-factor authentication / Security token / Authentication / One-time password / Password / Transaction authentication number / Multi-factor authentication / Anakam / Security / Computer security / Access control

Messaging on a mobile phone

Add to Reading List

Source URL: www.oneid.com

Language: English - Date: 2014-05-13 11:04:28
617Federated identity / Password / PowerSchool / Single sign-on / Security token / Security / Access control / Computer security

PowerSchool 7.x Parent Portal User Guide

Add to Reading List

Source URL: www.kimberly.k12.wi.us

Language: English - Date: 2011-08-16 14:10:51
618Computer network security / Security token / SecurID / RADIUS / Software token / One-time password / Authentication / Password / Virtual private network / Computer security / Security / Computing

CH A P T E R 10 Managing VPN Authentication This chapter explains how to manage VPN authentication for users using the Cisco AnyConnect Secure

Add to Reading List

Source URL: www.cisco.com

Language: English
619Security / Cyberwarfare / Computer security / Computer network security / Entrust / National security / Smart card / Public key certificate / Security token / Electronic commerce / Key management / Public-key cryptography

MSO_Administrator_Guide.book

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:50:43
620Access control / Password / Salt / Crypt / Security token / OTPW / Password manager / Security / Computer security / Cryptography

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley, Richard Shay, and Blase Ur October

Add to Reading List

Source URL: www.cylab.cmu.edu

Language: English - Date: 2015-01-06 12:41:54
UPDATE