Token

Results: 2997



#Item
531

Business Online Banking Security token instructions Welcome to safer internet banking As online fraud becomes increasingly sophisticated, our security measures need

Add to Reading List

Source URL: www.co-operativebank.co.uk

Language: English - Date: 2015-02-11 09:35:59
    532Reinforcement / Ethology / Clicker training / Token economy / Behaviorism / Behavior / Philosophy of psychology

    LESSON PLAN Activity Title: Module 3 – Lesson 8 Trainers in Training Space Needed: Classroom space, with tables or desk and chairs. Time Required:2-3 sixty-minute sessions.

    Add to Reading List

    Source URL: www.hua.org

    Language: English - Date: 2011-08-01 10:51:19
    533Security token / Certificate authority / Public key certificate / Smart card / Universal Serial Bus / Digital signature / Digital ID / Two-factor authentication / Public key infrastructure / Cryptography / Public-key cryptography / Key management

    Office of Controller of Certification Rajan Raj Pant Controller Government of Nepal

    Add to Reading List

    Source URL: www.cca.gov.np

    Language: English - Date: 2014-06-01 07:03:56
    534Electronic engineering / Password / Security token / Mobile telecommunications / Mobile phone / Technology / Digital media / One-time password

    MANUAL Skapat av (Efternamn, Förnamn, org.) Dokumentdatum

    Add to Reading List

    Source URL: www.trafikverket.se

    Language: English - Date: 2015-03-14 07:56:39
    535Federated identity / Single sign-on / HTTP cookie / Access token / Central Authentication Service / Identity management / Computer security / System software / Computing

    Implementation Guide Introduction This guide discusses the process and key topics involved in launching a video site on the Waywire platform.

    Add to Reading List

    Source URL: enterprise.waywire.com

    Language: English - Date: 2015-03-16 15:20:36
    536Tokens / Software / Desktop publishing software / Donald Knuth / TeX / Typesetting / Macro / Access token / Token coin / Computing / Macro programming languages / System software

    Marcin Woliński Multiple expansions triggered with a single \expandafter This pearl (coded on October 18, 1996) is the most useless one I could think of. Nonetheless it is an example of a really curious expansion of mac

    Add to Reading List

    Source URL: www.gust.org.pl

    Language: English - Date: 2010-02-01 09:49:46
    537Data / IEEE standards / Data transmission / Ethernet / Token ring / Time division multiple access / Contention / Network packet / Telecommunication / Information / Media Access Control / Computing

    A TYPICAL local a k a network (LAN)todayhasthe following characteristics: Transmits bits serially rather than in parallel.

    Add to Reading List

    Source URL: www.signallake.com

    Language: English - Date: 2013-03-16 17:12:40
    538Macro programming languages / Data modeling / Infographics / Table / LaTeX / TeX / Access token / Application software / Computing / Typography

    A new implementation of LATEX’s tabular and array environment∗ David Carlisle† Frank Mittelbach

    Add to Reading List

    Source URL: mirror.unl.edu

    Language: English - Date: 2015-04-12 16:30:12
    539One Card / Token coin / Thirty-one / Tock / Games / Crazy Eights / Egyptian Ratscrew

    Game rules A woodland game by Jacques Zeimet Ages: 5+ Number of players: 2-6 Duration: 15 minutes

    Add to Reading List

    Source URL: upload.snakesandlattes.com

    Language: English - Date: 2014-06-04 18:15:55
    540

    NAME: REWARDS Redeem this certificate and get 10 FREE tokens. Child(ren) must be present to redeem. No more than 1 of any free token offer

    Add to Reading List

    Source URL: www.chuckecheese.com

    - Date: 2014-01-02 12:28:21
      UPDATE