Token

Results: 2997



#Item
981McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
982Computer security / Pre-boot authentication / Security token / Two-factor authentication / Password / Serial ATA / Authentication / Hardware-based full disk encryption / BitLocker Drive Encryption / Cryptography / Disk encryption / Security

End Point Security DigiSAFE DiskCrypt Features and Benefits Real-Time Hardware-Based Encryption

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 01:58:51
983FeliCa / Ubiquitous computing / Near field communication / Bit rate / Smart card / ISO standards / Technology / Telecommunications engineering

Contactless IC Token The RC-S892 and RC-S893 products are suitable for applications that demand robust security. For example, e-money payment and ID authentication. These products can be set up easily in a wide range

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2014-10-09 02:37:31
984Token coin / Tokens

Restaurant Row Official “Neighborhood” Variant A criticism of Restaurant Row that I often hear is that the Word of Mouth track makes things too random and hard to plan for. I can’t entirely disagree with

Add to Reading List

Source URL: www.pair-of-dice.com

Language: English - Date: 2010-08-02 23:25:25
985Compiler construction / Programming language implementation / Structure editor / Lexical analysis / Programming language / Syntax / Parsing / Type–token distinction / Delimiter / Software engineering / Computing / Computer programming

On the Way of Bottom-Up Designing Textual Domain-Specific Modelling Languages Bastian Roth, Matthias Jahn, Stefan Jablonski University of Bayreuth Bayreuth, Germany {bastian.roth, matthias.jahn, stefan.jablonski} @ uni-b

Add to Reading List

Source URL: www.dsmforum.org

Language: English - Date: 2013-10-21 17:24:44
986Computer security / ISO standards / Ubiquitous computing / Security token / PKCS / Two-factor authentication / Smart card / Pre-boot authentication / PKCS11 / Cryptography / Cryptography standards / Security

End Point Security DigiSAFE KeyCrypt Features & Benefits Security

Add to Reading List

Source URL: www.digisafe.com

Language: English - Date: 2014-10-24 01:58:53
987Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2015-03-11 18:21:13
988Compiler construction / Parsing / Parser generators / Compiling tools / LL parser / Lookahead / Lex / Access token / Compiler / Programming language implementation / Computing / Software engineering

CppCC user’s guide∗ by Alec Panovici ([removed]) Last updated on 1st February[removed]c Copyright 2002

Add to Reading List

Source URL: cppcc.sourceforge.net

Language: English - Date: 2003-02-01 15:23:18
989McAfee / Two-factor authentication / One-time password / Password / Security token / Authentication / Password manager / Security / Computer security / Access control

Case Study AceIQ Customer profile Swedish IT consulting firm Industry

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:33
990Mobile telecommunications / Ubiquitous computing / Near field communication / Smart card / Telecommunications engineering / ISO standards / Technology / FeliCa

Contactless IC Token RC-S108 RC-S109 Employing AES, the new-generation standard coding

Add to Reading List

Source URL: www.sony.net

Language: English - Date: 2014-10-09 02:37:30
UPDATE