Privileged access

Results: 256



#Item
151Password / Cryptography / Identity management systems / Password strength / Privileged password management / Security / Access control / Computer security

University of Nebraska at Kearney Password Policy Purpose The purpose of this policy is to provide guidance for the proper use of passwords at the University of Nebraska at Kearney and to establish a standard for creatio

Add to Reading List

Source URL: www.unk.edu

Language: English - Date: 2014-03-25 09:12:20
152Access control / Password / Salt / Crypt / Security token / OTPW / Privileged password management / Security / Computer security / Cryptography

Measuring Password Guessability for an Entire University Michelle L. Mazurek, Saranga Komanduri, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Patrick Gage Kelley? , Richard Shay, and Blase Ur ? Carn

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2013-11-30 10:12:40
153Password / GrIDsure / Authentication / Password manager / Privileged password management / Security / Access control / Computer security

[Short Paper] The MVP Web-based Authentication Framework Sonia Chiasson, Chris Deschamps, Elizabeth Stobert, Max Hlywa, Bruna Freitas Machado, Alain Forget, Nicholas Wright, Gerry Chan, and Robert Biddle Carleton Univers

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2012-03-02 14:27:16
154Computer security / Login / Alternative medicine / Privileged password management / Password fatigue / Security / Access control / Password

Information Resources: Naturopathy This list is intended to provide possible sources of information. Please determine with your instructor which sources are appropriate for your coursework. Databases & Electronic Journal

Add to Reading List

Source URL: www.nuhs.edu

Language: English - Date: 2013-12-09 11:05:34
155National security / Public safety / Computer network security / Data security / Password / Information security / Access control / Privileged password management / Information security audit / Security / Computer security / Crime prevention

University of Alaska Office of Information Technology  System Security Guidelines    The university computing environment is made up of a variety of operating systems, devices and  applications.

Add to Reading List

Source URL: info.alaska.edu

Language: English - Date: 2014-06-09 20:06:42
156Computer security / Privileged password management / Password fatigue / Password / Security / Access control

Information Resources: Natural Medicine This list is intended to provide possible sources of information. Please determine with your instructor which sources are appropriate for your coursework. Library Webpage  http:

Add to Reading List

Source URL: www.nuhs.edu

Language: English - Date: 2013-12-09 11:04:18
157

RVP Redmond Vendor Profile Take Control of Privileged Access Privileged access management doesn’t have to be a

Add to Reading List

Source URL: download.101com.com

- Date: 2014-02-11 13:15:20
    158Computing / Information technology management / Identity management systems / Password policy / Privileged password management / Password / SAP AG / Software

    ACCESSING YOUR CAPITAL HEALTH PAY ADVICE ON-LINE Follow instructions below to access your pay advice on-line from the Capital Health website. 1. Open Internet Explorer 2. Go to https://hasp.nshealth.ca/irj/portal AND ad

    Add to Reading List

    Source URL: www.cdha.nshealth.ca

    Language: English - Date: 2014-10-07 09:36:38
    159Information security / Principle of least privilege / Password / Access control / System administrator / Privileged password management / Cyber-Ark / Computer security / Security / Computing

    Microsoft Word - I-Suite Access Control Plan__August2011.docx

    Add to Reading List

    Source URL: isuite.nwcg.gov

    Language: English - Date: 2011-11-02 14:07:11
    UPDATE