Software token

Results: 476



#Item
321Cryptography / Password / Passphrase / One-time password / Two-factor authentication / Cryptographic software / Security token / Crypt / Dictionary attack / Security / Computer security / Access control

Keeping Secrets: Good Password Practice Everyone knows that passwords are important, but how do you keep them safe? David Harley, BA CISSP FBCS CITP Director of Malware Intelligence

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:04
322Computer security / System software / Windows CardSpace / Information Card / OpenID / Security Assertion Markup Language / Identity provider / Security token / Active Directory Federation Services / Federated identity / Identity / Identity management

“Geneva” Claims Based Access Platform Beta 1 Datasheet Microsoft Identity and Access solutions are a set of platform technologies and products designed to help organizations manage user identities and associated acc

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-10-20 12:56:11
323Identity management systems / Federated identity / Identity management / Security Assertion Markup Language / Internet standards / SAML 2.0 / Access token / Security token / Shibboleth / Computing / System software / Computer security

Meteor 4 Token Provider Implementation Guide Version 1.2 Contributors: Richard Allen

Add to Reading List

Source URL: www.meteornetwork.org

Language: English - Date: 2013-05-09 10:14:08
324Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: mirrors.ucr.ac.cr

Language: English - Date: 2014-09-06 04:58:27
325Internet protocols / X Window System protocols and architecture / X Window System / Access token / Hooking / JavaScript / WebDAV / Computing / Software / X Window System core protocol

X Access Control Extension Specification Eamon F. Walsh 2009 Revision History Revision[removed]Oct 2006 Revised by: efw Initial Version

Add to Reading List

Source URL: www.x.org

Language: English - Date: 2009-10-26 01:40:36
326Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: mirror.its.dal.ca

Language: English - Date: 2014-09-06 03:58:00
327Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: ftp.heanet.ie

Language: English - Date: 2014-09-06 04:58:27
328Telephone number mapping / Tempa / Enumerated type / C / E / Token coin / Access token / Computing / Software engineering / Computer programming

The enumerate package∗ David Carlisle[removed]Abstract This package gives the enumerate environment an optional argument

Add to Reading List

Source URL: shadow.ind.ntou.edu.tw

Language: English - Date: 2014-09-06 04:58:27
329Identity management / Security Assertion Markup Language / Security token / Access token / Windows Vista / Microsoft Data Access Components / SAML 2.0 / System software / Computer security / Computing

Microsoft Word - MeteorErrorMessageCodes_v4_12052011

Add to Reading List

Source URL: www.meteornetwork.org

Language: English - Date: 2013-05-09 10:13:41
330Computer security / Man-in-the-browser / Security token / Entrust / Two-factor authentication / Mobile banking / Windows Mobile / Transaction authentication number / Online banking / Electronic commerce / Computing / Technology

Entrust IdentityGuard Mobile Software Development Kit Mobile devices are now the centerpiece to consumer lifestyles. From email communication, social networking, banking, commerce, shopping and personal entertainment, mo

Add to Reading List

Source URL: entrust.wpengine.netdna-cdn.com

Language: English - Date: 2013-05-03 16:48:12
UPDATE