Control system security

Results: 2384



#Item
121Software / System software / Computing / MacOS / Computer access control / Windows / Directory services / Computer network security / Keychain / Kerberos / Active Directory / Single sign-on

Apple Technical White Paper Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10

Add to Reading List

Source URL: training.apple.com

Language: English - Date: 2016-05-25 18:19:43
122

IP Access Control Assured Access. Complete Control. Synergis™ is the IP access control system that heightens your organization’s security, introduces you to non-proprietary hardware choices, and lets you go about yo

Add to Reading List

Source URL: www.genetec.com

Language: English - Date: 2016-04-13 15:02:48
    123Microsoft / Computer access control / Access control / Password / Security / Login / Outlook.com / Self-service password reset / Password notification email

    Licensing Tutorial How to use the Steel Licensing System Tutorial Overview This Tutorial will cover:

    Add to Reading List

    Source URL: ia.ita.doc.gov

    Language: English - Date: 2015-03-31 15:25:49
    124

    Access Management Network and System authentication, data/service authorization, password/credential management Physical Security Environmental controls, Control of access to critical facilities, equipment and/or media,

    Add to Reading List

    Source URL: www.vascan.org

    Language: English - Date: 2010-08-17 10:17:16
      125Computer access control / Identity management / Computer security / Computing / Federated identity / SOA Security / Security Assertion Markup Language / WS-Security / Single sign-on / Identity management system / Service-oriented architecture / Information Card

      Dynamic Business Service Networks using Virtual Organisations

      Add to Reading List

      Source URL: www.crosschecknet.com

      Language: English - Date: 2010-01-11 16:40:17
      126

      Personal Security Personnel screening, Segregation of duties, Confidentiality and appropriate use agreements System Monitoring and Control System hardening, threat detection, intrusion prevention, network/system logging,

      Add to Reading List

      Source URL: www.vascan.org

      - Date: 2007-08-21 14:03:33
        127Computer access control / Identity management / Computer security / Identity / Federated identity / Cloud standards / OAuth / Information Card / Location-based service / Internet privacy / Authentication / Identity management system

        The Case for a Location Metasystem Nick Doty School of Information, UC Berkeley ABSTRACT

        Add to Reading List

        Source URL: npdoty.name

        Language: English - Date: 2014-03-25 02:38:49
        128

        KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels John Criswell, Nathan Dautenhahn, and Vikram Adve Department of Computer Science University of Illinois at Urbana-Champaign Email: {criswell,d

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2014-04-21 13:48:10
          129Control engineering / Architecture Analysis & Design Language / Architecture description language / Software architecture / Systems architecture / Resilient control systems / Embedded system / Cyber-physical system / Computer security / Simulink / Networked control system / Control theory

          Towards Synthesis of Platform-aware Attack-Resilient Control Systems ∗ Extended Abstract Miroslav Pajic1

          Add to Reading List

          Source URL: www.georgejpappas.org

          Language: English - Date: 2013-05-22 16:56:10
          UPDATE