Password policy

Results: 1593



#Item
951Cryptography / Computer crimes / Password / Phishing / Salt / Two-factor authentication / Self-service password reset / Single sign-on / Password policy / Security / Computer security / Access control

AUTHENTICATION TECHNOLOGIES A Research Agenda Acknowledging the Persistence of Passwords Cormac Herley | Microsoft Research Paul van Oorschot | Carleton University

Add to Reading List

Source URL: www.computer.org

Language: English - Date: 2012-02-29 13:44:49
952Crime prevention / National security / Computing / Password / Phishing / Security awareness / Email / Password policy / Password strength / Security / Computer security / Public safety

Hardening The HumanOS Executive Summary Computers store, process and transfer data that is valuable to your organization. As a result, they have been the primary target for cyber attackers. Years ago, exploiting computer

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-06-20 07:36:29
953National security / Computer security / Password / User / Operating system / Internet privacy / Network security / Password manager / Security / Computing / Crime prevention

CAMERON UNIVERSITY Computer Use Policy Policy Statement Access to modern information technology is essential to the pursuit and achievement of excellence across the Cameron University (CU) mission of instruction, researc

Add to Reading List

Source URL: www.cameron.edu

Language: English - Date: 2013-10-21 11:55:57
954Security / Identity management systems / Computer security / Federated identity / Password policy / Password strength / Password / Patient portal / Health

AADE7 System User FAQs I forgot my username and/or password. How can I reset it? If you forget your username or password, click the Forgot Username or Password link on the log-in screen. This will take you to a page on

Add to Reading List

Source URL: www.diabeteseducator.org

Language: English - Date: 2012-10-23 08:36:55
955Internet ethics / Email / Information technology management / Internet privacy / Computer network / Intranet / Network security / Spam / Password / Internet / Computing / Technology

City of Rapid City Technology Resource Usage Policy Technology Resource Usage Policy The following policies define appropriate use of the City of Rapid City network, electronic data transmission & recording equipment, te

Add to Reading List

Source URL: www.rcgov.org

Language: English - Date: 2011-08-02 16:20:34
956Button / Form / Computing / System software / Computer crimes / Password policy / Password / User interface techniques / Software

External e-Recruit FAQs Contents Login, User ID, and Password........................................................................................................................ 3 Q: How do I apply for positions wit

Add to Reading List

Source URL: www.cdha.nshealth.ca

Language: English - Date: 2014-10-08 17:33:31
957Computer security / Usability / User interface / Password policy / Password manager / Security / Password / Access control

Accessibility and Graphical Passwords 1 ∗ Sonia Chiasson1,2 , Alain Forget1,2 , Robert Biddle2

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-02-10 11:41:36
958Computer security / Password / Internet privacy / Privacy / Password manager / Password policy / Identity management / Security / Access control

Report on DIMACS∗ Workshop and Working Group Meeting on Usable Privacy and Security Software Date of Workshop: July 7-8, 2004 Date of Working Group Meeting: July 9, 2004 Workshop Organizers

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2005-05-10 10:24:32
959Cryptography / Cryptographic software / Password strength / Password policy / Password / Security / Computer security

Microsoft Word - Forget_HCI2008DC.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-02-10 11:41:37
960Internet privacy / Cryptography / Cryptographic software / Password strength / Password policy / Security / Password / Computer security

Microsoft Word - WIND14-01 privacy issues-1.doc

Add to Reading List

Source URL: www.scwind.com

Language: English - Date: 2014-02-17 11:34:38
UPDATE