Shadow system

Results: 2111



#Item
231Repurchase agreement / Financial markets / Haircut / Financial services / ICMA / Shadow banking system / Hypothecation / Collateral management / Open market operation / Financial economics / Finance / Economics

ICAP response to FSB Interim Report on Securities Lending and Repos London, 25 May 2012 BY ELECTRONIC MAIL

Add to Reading List

Source URL: www.financialstabilityboard.org

Language: English - Date: 2014-09-19 10:16:54
232Unix / Cryptographic software / System administration / One-time password / Password / Security token / Two-factor authentication / Shadow password / Challenge-response authentication / Computer security / Security / Access control

One-Time Passwords Hal Pomeranz Deer Run Associates One-Time Passwords – Unix Security Track All material in this course Copyright © Hal Pomeranz and Deer Run Associates,

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2001-02-08 01:03:21
233Computing / Backup / Time Machine / Shadow Copy / GRBackPro / Remote backup service / Backup software / Software / System software

Tri-BACKUP 7 Users Guide
 Tri-BACKUP 7 - Users Guide! 1 / 56

Add to Reading List

Source URL: www.tri-edre.com

Language: English - Date: 2014-02-05 06:21:00
234Computing / Windows Server / EMC NetWorker / Backup Exec / Microsoft Exchange Server / IBM Tivoli Storage Manager / NetBackup / CA ARCserve / Shadow Copy / Software / Backup software / System software

7.2 NOTICE TO USERS Ontrack® PowerControls™ is a software application that has been developed, copyrighted, and licensed by Kroll Ontrack Inc. Use of the software is governed by the terms and conditions of the end u

Add to Reading List

Source URL: www.ibas.no

Language: English - Date: 2015-05-04 03:25:37
235Cryptography / System administration / Unix / Password / Salt / Shadow password / Crypt / Password strength / Passwd / System software / Computer security / Software

‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security† Daniel V. Klein Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15217

Add to Reading List

Source URL: geodsoft.com

Language: English - Date: 2003-11-09 11:25:55
236Bacula / EMC Corporation / Virtual machines / Backup software / Shadow Copy / Hyper-V / Hypervisor / Snapshot / Backup / System software / Software / VMware

Bacula Enterprise Datasheet Enterprise Data Protection Virtualization

Add to Reading List

Source URL: www.baculasystems.com

Language: English - Date: 2015-03-19 13:12:23
237Shadow password / Password / Information technology management / Passwd / User identifier / Password manager / Group identifier / Unix / System software / Software

CXL SECURE AZScan Report for Demo 07-Dec:20

Add to Reading List

Source URL: www.cxlsecure.com

Language: English - Date: 2008-12-08 19:27:47
238Short selling / Financial markets / Financial services / Repurchase agreement / Shadow banking system / Securities lending / Undertakings for Collective Investment in Transferable Securities Directives / Security / Short / Financial economics / Finance / Investment

Microsoft Word - 12-4028_EFAMA - FSB Stock lending and repos

Add to Reading List

Source URL: www.financialstabilityboard.org

Language: English - Date: 2014-09-19 10:16:54
239Unix / System administration / Shadow password / Passwd / Operating system / Computer file / Password / Su / Environment variable / System software / Software / Computing

AZScan Documentation AZScan Documentation © CXL Ltd., 2008

Add to Reading List

Source URL: www.cxlsecure.com

Language: English - Date: 2009-12-10 18:28:41
240Finance / Financial risk / Shadow banking system / United States housing bubble / Central banks / Business / Bank / Financial Stability Board / Systemic risk / Financial economics / Economics

From: To: Cc: Subject: Date: Attachments:

Add to Reading List

Source URL: www.financialstabilityboard.org

Language: English - Date: 2014-09-19 10:17:00
UPDATE