Token

Results: 2997



#Item
741Computer network security / Crime prevention / National security / Access control / Identity management / Access token / Information security / Network security / User / Security / Computer security / Computing

bel_SolutionCenter_HGweiss

Add to Reading List

Source URL: www.bachmann.info

Language: English - Date: 2014-11-04 05:44:53
742Perl / Plain Old Documentation / Perl module / Token / POD / CPAN / Computing / Computer programming / Software engineering

Perl versiondocumentation - Pod::Simple::PullParserEndToken NAME Pod::Simple::PullParserEndToken -- end-tokens from Pod::Simple::PullParser SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 14:47:30
743Computer network security / Key management / Cloud infrastructure / Apache Hadoop / Cloud computing / Single sign-on / Kerberos / Generic Security Services Application Program Interface / Access token / Computing / Computer security / Cryptography

Hadoop Security Design Owen O’Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell Yahoo! {owen,kan,sradia,rmarti,cnh}@yahoo-inc.com October 2009

Add to Reading List

Source URL: issues.apache.org

Language: English
744Two-factor authentication / Usability / Authentication / Security token / Likert scale / Password / Email / Multi-factor authentication / One-time password / Security / Access control / Technology

Microsoft Word - Poster abstaract - Balancing usability and security in the business cloud authentication V3.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
745Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2015-03-11 18:21:13
746Token coin / Tokens / Exonumia / Griqua people / Griqualand East / Coin / Dollar coin / United States dollar / Silver coin / Numismatics / Currency / Money

Rewriting the Early Numismatic History of SOUTH AFRICA by Scott Balson here is a remarkable historical overlap between South Africa and

Add to Reading List

Source URL: www.tokencoins.com

Language: English - Date: 2013-08-29 23:15:48
747Computing / Data / Cyclic redundancy check / Universal Serial Bus / Network packet / Polynomial code / Communications protocol / Modulo operation / Transmission Control Protocol / Finite fields / Information / Binary arithmetic

Draft CYCLIC REDUNDANCY CHECKS IN USB Introduction The USB specification calls for the use of Cyclic Redundancy Checksums (CRC) to protect all non-PID fields in token and data packets from errors during transmission. Th

Add to Reading List

Source URL: www.usb.org

Language: English - Date: 2013-12-17 18:51:22
748Token coin / Tokens / Situation awareness

Studying Multi-Agency Planning Using Team Games Dr. Anthony H. Dekker Defence Science and Technology Organisation, Canberra, Australia Abstract. Collaborative team games such as SCUDHunt or Go*Team are use

Add to Reading List

Source URL: members.ozemail.com.au

Language: English - Date: 2011-04-14 01:47:07
749Natural language processing / Hierarchical hidden Markov model / Data mining / Type–token distinction / Latent semantic analysis / Cluster analysis / Lexical analysis / Statistics / Information science / Science

DISCOVERING MEANINGFUL MULTIMEDIA PATTERNS WITH AUDIO-VISUAL CONCEPTS AND ASSOCIATED TEXT L. Xie† , L. Kennedy† , S.-F. Chang† , A. Divakaran§ , H. Sun§ , C.-Y. Lin‡ † Dept. of Electrical Engineering, Columb

Add to Reading List

Source URL: www.ee.columbia.edu

Language: English - Date: 2004-06-22 00:48:01
750Security / Security token / Access token / Token

BusinessBank Application/Advice of Change A. Account holder details Title of Business Address of Business

Add to Reading List

Source URL: www.tsbbank.co.nz

Language: English - Date: 2014-10-12 21:57:02
UPDATE