Access control

Results: 10445



#Item
311Privacy / Data security / Internet privacy / Data protection / Computer security / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Computing / Personally identifiable information / Information privacy / Data Protection Act

Informative Note (Art. 13 of Legislative Decree no. 196 of 30 JuneThis informative note is provided for users who interact with the web services of BONNE NOUVELLE S.r.l., with registered office and headquarters in

Add to Reading List

Source URL: www.jkplace.com

Language: English - Date: 2015-11-30 05:25:12
312Medicine / Cardiac electrophysiology / Medical equipment / Medical devices / Physio-Control / Lifepak / Automated external defibrillator / Defibrillation / Cardiac monitoring / Cardiac arrest / Cardiopulmonary resuscitation

Product Bulletin Ready to Race: Physio-Control to Provide Monitor/Defibrillators, Automated External Defibrillators, and On-Site Support at 120th Running of Boston Marathon Runners and bystanders will have quick access t

Add to Reading List

Source URL: www.physio-control.com

Language: English - Date: 2016-04-15 13:24:07
313Computer access control / Security / Computer security / Prevention / Multi-factor authentication / Authentication / Security token / ESET / Information security / Access control / Electronic authentication / Strong authentication

ESET Secure Authentication Second factor authentication and compliance Document VersionNovember, 2013

Add to Reading List

Source URL: static5.esetstatic.com

Language: English - Date: 2014-02-07 08:20:03
314Smart cards / Computing / Security / Ubiquitous computing / Computer access control / ISO standards / HID Global / MIFARE / Card reader / Java Card OpenPlatform / Java Card / Access control

LOGICAL AND PHYSICAL ACCESS SOLUTIONS Crescendo® C1150 ƒƒ Higher security – Encryption and data signing protects data-at-rest and enables trusted secure communications. ƒƒ Supports Secure Identity Object™ (SIO)

Add to Reading List

Source URL: planc.biz

Language: English - Date: 2013-12-17 10:12:36
315World Wide Web / Computing / Internet privacy / Cyberspace / Information privacy / Computer access control / HTTP cookie / Hypertext Transfer Protocol / Opt-out / Privacy / Email / Google Analytics

Microsoft Word - AHUK_Privacy_statement

Add to Reading List

Source URL: www.auctionhouse.co.uk

Language: English - Date: 2015-09-16 04:42:21
316Computer access control / Computer security / Identity management / Federated identity / Shibboleth / IDM / Security Assertion Markup Language / Authentication

Report Market Analysis of IdM Solutions for Swiss edu-ID Name Surname Job Title Document Type:

Add to Reading List

Source URL: projects.switch.ch

Language: English - Date: 2016-07-14 11:47:46
317Computing / IEEE 802.11 / Wireless networking / Computer network security / Protected Extensible Authentication Protocol / Wi-Fi Protected Access / Control Panel / Wi-Fi / Extensible Authentication Protocol / Wireless security

Get Connected with KSU WiFi – Windows 7 Note: Windows Wireless Manager must be enabled. KSU Service Desk Faculty & Staff: Students:

Add to Reading List

Source URL: uits.kennesaw.edu

Language: English - Date: 2015-11-25 10:43:55
318Computer access control / Computer security / Access control / Password / Security / Login / Identity management / Password strength / Password management

Nissan Tech Info Dealer User Guide Version 4.0 Date Copyright© 2014 by Nissan Motor, Ltd.

Add to Reading List

Source URL: www.nissan-techinfo.com

Language: English - Date: 2014-09-23 13:56:51
319Watermarking / Cryptography / Access control / Authentication / Digital watermarking / Watermark / Microsoft Word / Search engine indexing / Document / Fingerprint / Audio watermark

Watermarking of Electronic Text Documents Mohan S Kankanhalli & K.F Hau School of Computing National University of Singapore, SingaporeEmail:

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2006-04-25 01:40:31
320Security / Computer security / Computer access control / Computer network security / Access control / Identity management / Multi-factor authentication / Authentication / Virtual private network / Secure Shell / Security token / Wireless security

Aintree NHS – Case Study Aintree University Hospitals Providing flexible and secure remote working for hospital staff

Add to Reading List

Source URL: www.cryptzone.com

Language: English - Date: 2015-04-28 16:57:36
UPDATE