Security token

Results: 1367



#Item
651Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2014-11-12 20:30:19
652Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2014-11-12 22:04:37
653One-time password / Two-factor authentication / Authentication / Password / Federated identity / Security token / HOTP / Security / Computer security / Access control

YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2014-09-24 13:06:57
654Access control list / Access token / Mandatory Integrity Control / Security / Computer security / Access control

Security Administration Guide

Add to Reading List

Source URL: support.equella.com

Language: English - Date: 2013-05-23 01:27:19
655Security / Tunneling protocols / Internet protocols / One-time password / Two-factor authentication / Security token / Password / OpenVPN / ESET / Computing / Computer security / Computer network security

Solutions Overview ESET Secure Authentication ESET Secure Authentication protects passwords and prevents data breaches Weak passwords cause real problems. With millions of passwords compromised each year, many companie

Add to Reading List

Source URL: static4.esetstatic.com

Language: English - Date: 2014-12-22 12:39:49
656Voting machine / USB flash drive / Firmware / DRE voting machine / Ballot / Security token / Technology / Government / Election fraud / Politics / Electronic voting / Information society

Security Evaluation of the Sequoia Voting System Public Report Computer Security Group Department of Computer Science University of California, Santa Barbara [removed]

Add to Reading List

Source URL: votingsystems.cdn.sos.ca.gov

Language: English - Date: 2014-12-02 18:19:17
657Security token / Public key certificate

Process flow for verification of member details in respect of claims submitted by ex-employees through his present employer If the member has opted for the present employer for attestation of claim and the member details

Add to Reading List

Source URL: epfindia.gov.in

Language: English - Date: 2013-10-04 08:00:59
658Data privacy / Electronic commerce / Money / Cryptography / Tokenization / Payment card industry / EMV / PA-DSS / Security token / Payment systems / Credit cards / Business

Mobile Payments Industry Workgroup Meeting Discussion on Tokenization Landscape in the U.S. - June 2-3, 2014

Add to Reading List

Source URL: www.bostonfed.org

Language: English - Date: 2014-09-22 17:31:23
659Security / Password / Information Card / Internet privacy / Identity management / User / Login / Access token / Electronic authentication / Computing / Computer security / Federated identity

WP8 Combined Demo on IDM GE (NSN) Data Handling GE (SAP) Privacy GE (IBM) Sept. 29th 2014, v8

Add to Reading List

Source URL: abc4trust.eu

Language: English - Date: 2014-10-06 05:52:41
660Click / Television in the United Kingdom / Security token / Claim / Public key certificate

PROCESS FLOW FOR ATTESTATION OF ONLINE TRANSFER CLAIMS To forward the online claims submitted by members, the employer should attest the claims submitted by the member on Online Transfer Claim Portal (OTCP) using his Dig

Add to Reading List

Source URL: epfindia.gov.in

Language: English - Date: 2013-10-04 08:00:49
UPDATE