Table computer

Results: 3684



#Item
671Security token / Two-factor authentication / One-time password / Password / Software token / Password manager / USB flash drive / Authentication / Multi-factor authentication / Security / Computer security / Access control

How to secure USB e-Token using VaultICTM Security Modules? Table of Contents Introduction .............................................................................................5

Add to Reading List

Source URL: www.insidesecure.com

Language: English
672Computer programming / Search algorithms / Compiler construction / Error detection and correction / Hash function / Cryptographic hash function / Hash table / Lexical analysis / Parsing / Computing / Software engineering / Hashing

Code Similarity Detection in Multiple Large Source Trees using Token Hashes Dr. Warren Toomey School of IT, Bond University Queensland. Australia

Add to Reading List

Source URL: minnie.tuhs.org

Language: English - Date: 2011-12-11 22:34:52
673Digital photography / Image processing / Pixel / Television technology / Computer graphics / Digital geometry / Digital imaging

Microsoft Word - Supplementary Table S1.docx

Add to Reading List

Source URL: www.the-cryosphere.net

Language: English - Date: 2014-12-04 08:33:05
674Computer buses / Apple Thunderbolt Display / High-definition television / Television technology / Video signal / Thunderbolt / Universal Serial Bus / HDMI / Mac Mini / Computer hardware / Computing / Apple Inc.

Thunderbolt™ Station User Guide For more information visit www.caldigit.com Table of Contents

Add to Reading List

Source URL: www.caldigit.com

Language: English - Date: 2014-08-21 22:38:00
675Password / Authenticator / Software token / Access token / SMS / Authentication / Security token / Security / Technology / Computer security

Soft tokens for SMS PASSCODE © SMS PASSCODE® 2014 Soft tokens for SMS PASSCODE Table of Contents

Add to Reading List

Source URL: www.smspasscode.com

Language: English - Date: 2014-08-25 11:19:47
676Computer vision / Symmetry / Vision / Hash table / Geometric hashing / Object recognition / Hash function / Rotational symmetry / Sampling / Search algorithms / Statistics / Artificial intelligence

Procedia Computer Science–15 Procedia Computer Science

Add to Reading List

Source URL: users.isr.ist.utl.pt

Language: English - Date: 2014-10-02 16:21:53
677Computer icon / Image editing / Visual arts / Paper art / Silhouette

silhouettestudio V3 Table of Contents Software Usage Agreement.............................................. 2 Registered Trademarks..................................................... 2

Add to Reading List

Source URL: cdn.silhouetteamerica.com

Language: English - Date: 2015-01-21 19:29:05
678Random password generator / Markov chain / Openwall Project / Rainbow table / Computer security / Probability and statistics / Cryptography / Randomness / Password

Probabilistic password generators (and fancy curves) Simon Marechal (bartavelle at openwall.com) http://www.openwall.com @Openwall

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 13:03:31
679Virtual machines / IOMMU / Memory management / Hardware virtualization / X86 virtualization / Graphics address remapping table / Xen / Hypervisor / Hyper-V / System software / Software / Computer hardware

Utilizing IOMMUs for Virtualization in Linux and Xen Muli Ben-Yehuda Jon Mason Orran Krieger

Add to Reading List

Source URL: developer.amd.com

Language: English - Date: 2013-10-24 23:32:42
680Password / One-time password / Login / Form / Human–computer interaction / Computing / Transaction authentication number / Software

E-Return Intermediary (ERI) User Registration and Services 1 Table of Contents

Add to Reading List

Source URL: incometaxindiaefiling.gov.in

Language: English - Date: 2015-01-29 13:32:25
UPDATE