Access control

Results: 10445



#Item
711Certificate authorities / Computer access control / IdenTrust / Authentication / ING Group / Bank / EBAM

IdenTrust™ Electronic Account Management Streamlining Processes & Reducing Costs for Global Corporations Account Opening and Maintenance Made Easy

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2012-07-10 20:41:45
712Network performance / Wireless LAN / Transmission Control Protocol / Wireless access point / Packet loss / Throughput / IEEE 802.11 / Explicit Congestion Notification / TCP congestion control / Wi-Fi / Multipath TCP / Transport layer

Towards WiFi Mobility without Fast Handover Andrei Croitoru, Dragos, Niculescu, Costin Raiciu, University Politehnica of Bucharest Abstract

Add to Reading List

Source URL: nets.cs.pub.ro

Language: English - Date: 2015-02-26 07:39:25
713Computer access control / Password / Security / Login / Social engineering / WhatPulse / Features of the Opera web browser

Creating Communities in Digication 1. Login to your Digication account ( http://www.laguardia.edu/eportfoliosso/ ). Click the “Click here” button to enter the login screen. Enter your login information. (See image 1.

Add to Reading List

Source URL: eportfolio.lagcc.cuny.edu

Language: English - Date: 2012-06-27 12:59:38
714Payment systems / E-commerce / Online banking / Computer access control / Cheque / Security token / Transaction authentication number / Internet fraud / Alternative payments / Giropay

Reference Guide – Business Online Banking Welcome to safer internet banking As online fraud becomes increasingly sophisticated our security measures need to advance to combat these crimes.

Add to Reading List

Source URL: www.co-operativebank.co.uk

Language: English - Date: 2014-07-01 05:27:35
715Gun politics / Firearms / Child access prevention law / Gun violence in the United States / Gun control / Overview of gun laws by nation / Gun violence / Gun safety / Gun politics in the United States / Gun laws in Australia

Child Access Prevention Laws 1 

Add to Reading List

Source URL: nyagv.org

Language: English - Date: 2013-06-21 16:40:10
716Assistive technology / Computer configuration / Windows 7 / Windows key / Magnifier / Virtual keyboard / Screen reader / Microsoft Narrator / Control Panel / Computer keyboard / Start menu / System Preferences

Superiorland Library Cooperative January 2014 Prepared by Jean Montgomery Microsoft Ease of Access products built into Windows 7 & 8 Ease of Access Center

Add to Reading List

Source URL: joomla.uproc.lib.mi.us

Language: English - Date: 2014-01-03 13:32:54
717Identification / Biometrics / Microcontrollers / Computer security / Perimeter security / Fingerprint / Access control / Mbed / Biometrics in schools

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-08-27 03:24:36
718Bin / Furniture

Flexi-Bins ® Flexi-Bins® Take Control of Inventory Organization Take control of inventory organization and access in a way you never thought possible with

Add to Reading List

Source URL: www.borroughs.com

Language: English - Date: 2012-07-18 09:40:42
719United States Department of Homeland Security / Government / Screening Partnership Program / Access control / Aviation security / Transportation Security Administration / Homeland security / Airport security / Homeland Security Act / DHS Science and Technology Directorate / Sensitive security information / Covenant Aviation Security

PRESS RELEASE AKAL SECURITY RECEIVES SAFETY ACT DESIGNATION (September 8, 2015) ESPANOLA, NM – The U.S. Department of Homeland Security (DHS) has awarded Akal Security with its second SAFETY Act Designation, after care

Add to Reading List

Source URL: theakalgroup.com

Language: English - Date: 2015-09-08 10:27:48
720Public-key cryptography / Access control / Message-oriented middleware / Identity management / Distributed computing architecture / Publishsubscribe pattern / ID-based encryption / Authentication / Encryption / Cryptographic protocol / Extensible Authentication Protocol / PubSubHubbub

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-07-06 14:14:55
UPDATE