Access management

Results: 12376



#Item
921Academic publishing / Open access / Free culture movement / Communication / Research / CGIAR / Institutional repository / Self-archiving / Data management plan / Open data

Approved by CGIAR Consortium Board October 2, 2013 CGIAR Open Access and Data Management Policy (the “Policy”) 1. Preamble

Add to Reading List

Source URL: www.icarda.org

Language: English - Date: 2014-11-24 05:09:32
922Noise pollution / Types of roads / Noise reduction / Environmental engineering / Acoustics / Noise barrier / Noise regulation / Computer simulation / Traffic / Noise / Controlled-access highway / Level of service

TRAFFIC NOISE MODELING AND ANALYSIS PRACTITIONERS HANDBOOK Florida Department of Transportation Environmental Management Office

Add to Reading List

Source URL: www.dot.state.fl.us

Language: English - Date: 2015-05-08 14:52:23
923Computer access control / Cybercrime / Key management / Public-key cryptography / Transport Layer Security / Phishing / Certificate authority / Multi-factor authentication / Identity theft / Public key infrastructure / Authentication / Security token

Building an Identity Management Infrastructure Today That Will Continue to Work Tomorrow IdenTrust B

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-05-19 18:55:28
924Watermarking / MPEG / Audio codecs / Digital photography / Digital watermarking / Computer file formats / Steganography / Watermark / Moving Picture Experts Group / Computer network / MPEG-2 / Frame

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2014-12-09 09:22:49
925Identity management / Identity documents / Computer access control / Privacy / Federated identity / Digital identity / Electronic identification / Authentication / Internet privacy / Interoperability / Smart card / Personally identifiable information

GLOBAL IDENTITY NETWORKING OF INDIVIDUALS The Individualised Digital Identity Model

Add to Reading List

Source URL: www.iked.org

Language: English - Date: 2014-03-11 17:40:39
926Payment systems / Key management / Public key infrastructure / Public-key cryptography / Computer access control / Voucher / School voucher / Certificate authority / Smart card / Security token / Public key certificate / Credit card

IdenTrust Global Common (IGC) VOUCHER ORDER FORM Use this form to purchase 5+ IdenTrust Global Common (IGC) vouchers if using a credit card, or 1+ if using a purchase order for payment.  

Add to Reading List

Source URL: www.identrust.com

Language: English - Date: 2016-03-04 17:45:08
927

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-16 07:07:48
    928

    ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

    Add to Reading List

    Source URL: www.ijmetmr.com

    Language: English - Date: 2015-07-06 14:15:29
      929

      ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

      Add to Reading List

      Source URL: www.ijmetmr.com

      Language: English - Date: 2015-02-06 06:58:27
        930Ubiquitous computing / Computer storage devices / Smart cards / ISO standards / Computer access control / Security token / Radio-frequency identification / Card reader / Secure Digital / USB / Contactless smart card / Common Access Card

        the company identity management charismathics user conveniance

        Add to Reading List

        Source URL: planc.biz

        Language: English - Date: 2011-01-27 05:19:21
        UPDATE