Access control

Results: 10445



#Item
931Cryptography / Software / Computer security / OpenPGP / Cryptographic software / Computer access control / USB / YubiKey / Gpg4win / GNU Privacy Guard / Public-key cryptography / Encryption

GnuPG Installation, Key Generation, & Decryption

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2015-12-15 16:56:28
932

Enabling Government and Business Transformation With Mandatory Access Control Security December 2006

Add to Reading List

Source URL: www.tresys.com

Language: English - Date: 2014-07-23 16:59:18
    933Computing / Cloud computing / Cloud standards / Cloud applications / Computer access control / Federated identity / OAuth / Cloud-based integration / Salesforce.com / International Federation for Information Processing / Integration platform / OpenID

    Microsoft PowerPoint - presentation-final

    Add to Reading List

    Source URL: demo.a-sit.at

    Language: English - Date: 2016-05-12 06:20:00
    934Computer access control / Computer security / Computing / World Wide Web / Human-based computation / Hacking / Social engineering / Spamming / CAPTCHA / Internet bot / Cross-site request forgery / Transaction authentication number

    Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter Amir Herzberg Dept. of Computer Science

    Add to Reading List

    Source URL: www2016.net

    Language: English - Date: 2016-04-10 09:10:41
    935Computer access control / USB / YubiKey / PIV

    YubiKey PIV Quick Start Guide Getting Started YubiKey 4, YubiKey 4 Nano, YubiKey NEO, YubiKey NEO-n YubiKey PIV Quick Start Guide

    Add to Reading List

    Source URL: www.yubico.com

    Language: English - Date: 2016-05-25 18:03:49
    936Software / Information management / Portal software / Records management technology / SharePoint / Information technology management / Computing / Control key / Common Access Card / Army Knowledge Online

    Instructions for Accessing Course Materials in SSI’s SharePoint All students must have access to SharePoint 2010 to be able to access course materials. Below are the steps to effect this process: 1. Clear the cache by

    Add to Reading List

    Source URL: www.ssi.army.mil

    Language: English
    937Computing / Computer access control / Computer security / Cloud standards / Identity management / Identity management systems / Federated identity / OAuth / User-Managed Access / XACML / OpenID Connect / OpenID

    Securing Integration of Cloud Services in Cross-Domain Distributed Environments Bojan Suzic Institute for Applied Information Processing and Communications Graz, Austria

    Add to Reading List

    Source URL: demo.a-sit.at

    Language: English - Date: 2016-04-19 05:19:12
    938

    MA NRCS- EQIP FY’16 Practice Guidance Access Control (Acres) Code: 472 Definition

    Add to Reading List

    Source URL: masswoodlandsinstitute.org

    Language: English - Date: 2016-01-22 09:55:58
      939Computing / Supercomputers / Ethernet / Parallel computing / Computer memory / SCSI / IWARP / Remote direct memory access / OpenFabrics Alliance / ISCSI / RDMA over Converged Ethernet / Transmission Control Protocol

      High-Performance GPU Clustering: GPUDirect RDMA over 40GbE iWARP Tom Reu Consulting Applications Engineer Chelsio Communications

      Add to Reading List

      Source URL: www.chelsio.com

      Language: English - Date: 2016-05-31 17:42:25
      940Alarms / Security alarm / Smartphones / Home automation / Lighting / Fire alarm system / Access control / Eclipse / X10 / Android

      2016 Intruder Alarm Systems Product Catalogue Table of

      Add to Reading List

      Source URL: teletek-electronics.com

      Language: English - Date: 2016-04-15 03:06:25
      UPDATE