Software token

Results: 476



#Item
91Compiler construction / Programming language implementation / Structure editor / Lexical analysis / Programming language / Syntax / Parsing / Type–token distinction / Delimiter / Software engineering / Computing / Computer programming

On the Way of Bottom-Up Designing Textual Domain-Specific Modelling Languages Bastian Roth, Matthias Jahn, Stefan Jablonski University of Bayreuth Bayreuth, Germany {bastian.roth, matthias.jahn, stefan.jablonski} @ uni-b

Add to Reading List

Source URL: www.dsmforum.org

Language: English - Date: 2013-10-21 17:24:44
92Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2015-03-11 18:21:13
93Compiler construction / Parsing / Parser generators / Compiling tools / LL parser / Lookahead / Lex / Access token / Compiler / Programming language implementation / Computing / Software engineering

CppCC user’s guide∗ by Alec Panovici ([removed]) Last updated on 1st February[removed]c Copyright 2002

Add to Reading List

Source URL: cppcc.sourceforge.net

Language: English - Date: 2003-02-01 15:23:18
94Cryptographic software / Electronic commerce / PKCS / Microsoft CryptoAPI / X.509 / S/MIME / Security token / RSA / Smart card / Cryptography / Public-key cryptography / Cryptography standards

CSPid is a virtual smartcard that maintains a central repository for X.509 certificates and private keys. It provides a secure environment for cryptographic operations that applications may access via Java, PKCS#11, or M

Add to Reading List

Source URL: www.infoseccorp.com

Language: English - Date: 2009-11-06 16:00:30
95Computer network security / PKCS11 / Key management / Security token / PKCS / Smart card / Virtual private network / Revocation list / Cryptography / Public-key cryptography / Cryptography standards

VPN Client Software Deployment Guide (PKI Options)

Add to Reading List

Source URL: www.thegreenbow.fr

Language: English - Date: 2013-01-18 06:45:54
96Identity management / Computer crimes / Password / Cryptographic software / One-time password / LastPass Password Manager / Two-factor authentication / Security token / Keystroke logging / Security / Access control / Computer security

Password Management Security Update - Best Practices for General User uthentication is the process of identifying the authenticity of a user. It can be accomplished by means of a combination of login ID (identification)

Add to Reading List

Source URL: www.istf.jucc.edu.hk

Language: English - Date: 2015-01-28 23:37:15
97Password / Login / Transaction authentication number / Internet Explorer 8 / Password manager / Keystroke logging / Software / Security / Access control

Security Guidelines for Uses of IDEALTM Services a) You should not disclose your IDs or pin (login pin, token pin or any other pins used to access our Internet service) to any third party. No one at DBS Bank (Hong Kong)

Add to Reading List

Source URL: www.dbs.com.hk

Language: English - Date: 2014-08-21 00:41:50
98Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 Contents Page 4

Add to Reading List

Source URL: ssl.apple.com

Language: English - Date: 2015-03-11 18:21:14
99Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2015-03-20 01:23:10
100Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: ssl.apple.com

Language: English - Date: 2015-03-19 23:42:32
UPDATE