Control system security

Results: 2384



#Item
841Identity management / Access control / Single sign-on / Password / Identity management system / Password fatigue / Privileged password management / Federated identity / Computer security / Security

NSW Identity Hub (ID-Hub) Providing secure, single sign-on The NSW Identity Hub (ID-Hub) simplifies access to ICT systems by enabling a single login for all systems and information. An Identity Hub to serve

Add to Reading List

Source URL: www.govdc.nsw.gov.au

Language: English - Date: 2014-11-25 23:33:19
842Law enforcement / Directed-energy weapons / Behaviorism / Military equipment / Active Denial System / Collective behavior / Crowd psychology / Behavior modification / Crowds / Security / Non-lethal weapons / Technology

Crowd Behavior, Crowd Control, and the Use of Non-Lethal Weapons HUMAN

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2008-10-30 09:20:45
843Computing / Cross-platform software / Security / Resource Access Control Facility / Identity management / Data modeling / Access control / DB2 / Database management system / IBM DB2 / Software / Relational database management systems

C H A P T E R 3 Access and Security

Add to Reading List

Source URL: editorial.mcpressonline.com

Language: English - Date: 2012-03-09 11:18:53
844Computer network security / Cross-platform software / Nmap / Idle scan / Port scanner / Port knocking / Ping / Transmission Control Protocol / Port / Software / System software / Computing

Table of Contents Preface .............................................................................................................................. xxi 1. Introduction ...............................................

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:10:42
845Control flow / Setjmp.h / Crime prevention / National security / User identifier / Vulnerability / Chroot / Model checking / Computer security / System software / Computing / Software

MOPS: an Infrastructure for Examining Security Properties of Software ∗ †

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
846Computer security / Password / Security token / Login / User / Two-factor authentication / Transaction authentication number / Su / Access token / Security / Access control / Computing

USER MANUAL e-SUBMISSION SYSTEM OF CENTRAL REGISTRY OF DRUG ABUSE

Add to Reading List

Source URL: www.nd.gov.hk

Language: English - Date: 2012-11-09 03:14:49
847National security / Crime prevention / Content management systems / Records management / Electronic document and records management system / Information security / Classified information / Access control / Physical security / Security / Computer security / Public safety

access & storage Access denied – navigating the digital information security maze Out there, in the corridors of power, the

Add to Reading List

Source URL: www.changefactory.com.au

Language: English - Date: 2014-01-16 22:30:12
848Computer security / ZoneAlarm / Network security / Check Point / Norton Internet Security / Kerio Control / Antivirus software / Software / System software

User Guide for Zone Labs Security Software Version 5.0 Smarter Security TM © 2004 Zone Labs Incorporated All rights reserved.

Add to Reading List

Source URL: download.zonealarm.com

Language: English - Date: 2004-05-04 17:42:32
849Identity management / Authentication / Notary / Packaging / Two-factor authentication / Federated identity / Password / Electronic authentication / Multi-factor authentication / Security / Cryptography / Access control

Electronic Authentication Animations – Two-factor Authentication (Script) Introduction Joe needs to implement an e-authentication module in an information system. colleague Alan introduces the three basic authenticati

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-28 04:23:20
850Internet protocols / Computer network security / Port scanner / Transmission Control Protocol / Pcap / Port / User Datagram Protocol / Network protocols / Port knocking / Software / Computing / System software

July 2014 http://twitter.com/netscantools http://www.facebook.com/NetScanTools http://www.youtube.com/user/netscantools http://netscantools.blogspot.com/

Add to Reading List

Source URL: www.netscantools.com

Language: English - Date: 2014-07-30 16:15:32
UPDATE