Identity 2.0

Results: 599



#Item
421Computing / Computer network security / Web 2.0 / Windows Live ID / Password / User / Federated identity

ALERTBOSTON USER PROFILE UPDATE Step 1: Logging into the new portal You will be prompted to enter their username and password. Username MUST be entered in ALL LOWER CASE characters, even if the username was entered with

Add to Reading List

Source URL: www.cityofboston.gov

Language: English - Date: 2014-07-09 13:11:13
422Computer security / Data security / Spamming / Cross-platform software / Web 2.0 / Gmail / Data breach / SecurID / Identity theft / Computing / Security / Internet

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:43:24
423Email / Hotmail / Web 2.0 / Webmail / Windows Live / Dividend / Identity document / United States Postal Service / Cheque / Microsoft / Computing / Business

Shareholder Request for Replacement Identification Card

Add to Reading List

Source URL: www.ciri.com

Language: English - Date: 2014-03-13 12:35:45
424Login / Computer security / Web 2.0 / Webmail / Federated identity / Access control / Security / Password

STAT!Ref Mobile App Instructions STAT!Ref iPhone and iPad App The STAT!Ref Mobile App allows you to access your institution’s STAT!Ref subscription from your iPhone and iPad. The STAT!Ref Mobile App can be downloaded

Add to Reading List

Source URL: www.statref.com

Language: English - Date: 2014-04-16 17:38:46
425Social information processing / Blog hosting services / Web 2.0 / Identity management / Social media / Internet privacy / Reputation / Google / Brand page / Computing / World Wide Web / Software

OSP Social Media Resource Module 3: Building Your Brand In this Ontario Skills Passport (OSP) Social Media Resource module, you will learn how to:  

Add to Reading List

Source URL: skillszone.ca

Language: English - Date: 2014-04-21 08:22:45
426Password / Authentication / Security / Access control / Identity management

CROMERR System Checklist Item Attachment 2 – CDX Registration Maintenance Rules of Behavior Release 1.0.doc Attachment 3 – RegMain Procedures[removed]pdf

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-07-31 10:34:54
427Web 2.0 / Identity management / Real-time web / Android software / Social media / Internet privacy / Privacy / Facebook features / Facebook / Computing / Software / World Wide Web

June 19, 2012 The Honorable Kamala D. Harris Attorney General of California California Department of Justice 1300 "I" Street Sacramento, CA[removed]

Add to Reading List

Source URL: www.oag.ca.gov

Language: English - Date: 2014-09-09 11:58:41
428Login / Access control / Security / Federated identity / Computer crimes / Social engineering / Web 2.0 / Password / Computing / User

Microsoft Word[removed]MedicareBlue Online Training Center User Guide.doc

Add to Reading List

Source URL: www.wellmark.com

Language: English - Date: 2013-08-21 10:42:27
429SAML 2.0 / Security Assertion Markup Language / Certificate signing request / PKCS / OpenID / Public key certificate / Root certificate / Certificate authority / Cryptography / Public-key cryptography / Key management

Federal Identity, Credential, and Access Management E-Governance CA (EGCA) E-Governance Trust Services (EGTS) Certificate Application and Issuance Process Version 1.0

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2013-07-01 15:15:56
430Computing / Web 2.0 / Blog hosting services / Community websites / Virtual reality / Social networking service / Internet privacy / Social media / Identity theft / Technology / World Wide Web / Social information processing

Social media: pitfalls to avoid Although social media sites offer lawyers many interesting new ways to interact with people in both personal and work spheres, there are some

Add to Reading List

Source URL: www.practicepro.ca

Language: English - Date: 2009-12-02 12:43:19
UPDATE