Control system security

Results: 2384



#Item
461Security / Good Laboratory Practice / United States Environmental Protection Agency / Information security / Toxic Substances Control Act / Information systems / Laboratory information management system / Information technology

EdGOOD AUTOMATED LABORATORY PRACTICES Chapter 1 — GALP Overview

Add to Reading List

Source URL: www.atlab.com

Language: English - Date: 2015-03-30 01:52:29
462Unix / Cryptographic software / System administration / One-time password / Password / Security token / Two-factor authentication / Shadow password / Challenge-response authentication / Computer security / Security / Access control

One-Time Passwords Hal Pomeranz Deer Run Associates One-Time Passwords – Unix Security Track All material in this course Copyright © Hal Pomeranz and Deer Run Associates,

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2001-02-08 01:03:21
463Internet / Network management / Computer network security / Tunneling protocols / System administration / Simple Network Management Protocol / TACACS / Port / Access control / Computing / Internet protocols / Network architecture

ComView IPm ComView IPm is an integrated, multi-functional device designed for remote equipment access, control, and alarm monitoring applications ComView IPm integrates a 10-port intelligent console server, a 3-port 10

Add to Reading List

Source URL: www.csstel.com

Language: English - Date: 2014-06-20 16:22:44
464Identification / Surveillance / Access control / Fingerprint / Fingers / Human anatomy / Public key fingerprint / Card reader / Operating system / Fingerprints / Security / Biometrics

PDF Document

Add to Reading List

Source URL: www.dermalog.com

Language: English - Date: 2013-05-16 15:18:05
465Object-oriented programming / Access control / Identity management / X.509 / Object database / Separation of mechanism and policy / Security / Computing / Computer security

A Flexible Security System for Metacomputing Environments Adam Ferrari, Frederick Knabe, Marty Humphrey, Steve Chapin, and Andrew Grimshaw Department of Computer Science University of Virginia, Charlottesville, VA 22903,

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 1998-12-04 14:58:14
466Network architecture / Network management / Internet standards / Computer network security / System administration / Modbus / Simple Network Management Protocol / Network switch / RADIUS / Computing / Technology / Internet protocols

ComView Wm ComView WM is a wireless, SNMP and Modbus RTU/ TCPmanageable, multi-functional device designed for remote equipment access, control, and alarm monitoring applications that require convenient use of mobile pho

Add to Reading List

Source URL: www.csstel.com

Language: English - Date: 2014-06-20 16:23:57
467Access control / Biometrics / Identification / Surveillance / Identity document / Digital identity / Interactive kiosk / Identity assurance / Authentication / Security / Identity management / Identity

Microsoft Word - NextgenID_news_WV_chooses_biometric_enrollment_system_071614

Add to Reading List

Source URL: www.nextgenid.com

Language: English - Date: 2014-07-16 23:59:06
468Federal Aviation Administration / Air safety / Air Traffic Organization / Next Generation Air Transportation System / System Wide Information Management / Automatic dependent surveillance-broadcast / Computer security / Federal Information Security Management Act / Joint Planning and Development Office / Aviation / Air traffic control / Transport

GAO, Air Traffic Control: FAA Needs a More Comprehensive Approach to Address Cybersecurity As Agency Transitions to NextGen

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2015-04-14 15:37:05
469Denial-of-service attack / System software / Internet security / Cyberspace / Smurf attack / SYN flood / Transmission Control Protocol / Ping / Denial-of-service attacks / Computer network security / Computing

Past and Future Internet Disasters: DDoS attacks survey and analysis Thomas Dübendorfer <> Arno Wagner <> April 8th, 2003

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2003-06-26 15:18:01
470Filesystem permissions / Ls / Microsoft Windows / Unix / Access control / SetACL / Chmod / Computing / Software / System software

Class Notes: February 16, 2006 Topic: A Case Study in UI Design and Evaluation for Computer Security Lecturer: Rob Reeder Scribe: Colleen Koranda Improving user-interface dependability through mitigation of human error

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-02-16 14:23:54
UPDATE