Tokenization

Results: 214



#Item
71Electronic commerce / Computing / Authorize.Net / Payment systems / Tokenization / Merchant account / Apple Inc. / Apple Developer / Merchant services / Business / Technology

ProductName_Getting_Started.book

Add to Reading List

Source URL: www.authorize.net

Language: English - Date: 2014-09-09 21:52:22
72Security / Information science / Linoma Software / Dynamic SSL / Cryptography / Tokenization / Software

Understanding and Selecting a Tokenization Solution Understanding and Selecting a Tokenization Solution 1

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:12
73Natural language processing / Tokenization / Part-of-speech tagging / Word-sense disambiguation / Twitter / Lexical analysis / Hierarchical clustering / Linguistics / Computational linguistics / Science

Part-of-Speech Tagging for Twitter: Word Clusters and Other Advances Olutobi Owoputi∗ Brendan O’Connor∗ Chris Dyer∗ Kevin Gimpel†

Add to Reading List

Source URL: www.ark.cs.cmu.edu

Language: English - Date: 2012-09-21 09:09:14
74Data analysis / Natural language processing / Corpus linguistics / Summary statistics / Collocation / Language education / Tokenization / Bigram / Terminology extraction / Statistics / Linguistics / Science

c January 7, 1999 Christopher Manning & Hinrich Schütze. DRAFT! 5 COMPOSITIONALITY

Add to Reading List

Source URL: www-nlp.stanford.edu

Language: English - Date: 2001-05-28 02:50:37
75Special purpose file systems / Public-key cryptography / Filesystem-level encryption / Encryption / Data security / Database security / Vormetric / Disk encryption hardware / Cryptography / Disk encryption / Cryptographic software

Understanding and Selecting a Database Encryption or Tokenization Solution Securosis, L.L.C.

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:12
76Computing / Disk encryption / Hashing / Search algorithms / Crypt / MD5 / Payment Card Industry Data Security Standard / Tokenization / Hash function / Cryptography / Cryptographic hash functions / Computer security

PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2015-02-18 09:34:54
77Technology / Tokenization / SecureWare Inc. / Computing / Computer hardware / Hewlett-Packard

H-P to Buy Security Technology Provider Voltage Security Feb. 10, 2015 By Josh Beckerman Hewlett-Packard Co. agreed to buy Voltage Security in a deal aimed at enhancing the company’s security

Add to Reading List

Source URL: www.morgenthaler.com

Language: English - Date: 2015-02-12 14:40:55
78Credit cards / Money / Data privacy / Computer security / Debit card / Data breach / Identity theft / Tokenization / Online shopping / Payment systems / Electronic commerce / Business

Microsoft Word - NRF Written Testimony for House OGR Hearing - 18 Mar 2015.docx

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-03-17 17:58:00
79Steve Jobs / Credit card fraud / Fraud / Credit card / Apple Inc. / IPhone / Tokenization / Bank card number / Apple ID / Computing / Electronics / Technology

PDF Document

Add to Reading List

Source URL: www.nilsonreport.com

Language: English - Date: 2015-03-05 12:05:41
80Digital typography / Desktop publishing software / Donald Knuth / TeX / Typesetting / Tokenization / Device independent file format / GNU readline / Lexical analysis / Software / Computing / Application software

A Tour around the NT S implementation Karel Skoupý Reasons for Making a New System •

Add to Reading List

Source URL: www.ntg.nl

Language: English - Date: 2001-09-29 10:24:00
UPDATE