Software token

Results: 476



#Item
211Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: www.apple.com

Language: English - Date: 2014-11-12 22:04:37
212Application programming interface / Security token / Computing / Software / Technology / Access token / Computer security / Extensible Storage Engine

NOT PROTECTIVELY MARKED HMRC Data Provisioning Service API Andy Greener, Business Tax Programme, HMRC Graham Jenkins, Capgemini

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-12-19 07:16:11
213

Guida ripristino TokenUSB Il sw è reperibile sul sito www.card.infocamere.it, nella sezione : • “Download Software di firma” ◦ Download software di ripristino del token USB. 1 Procedura di ripristino Windows

Add to Reading List

Source URL: www.firma.infocert.it

Language: Italian - Date: 2014-07-08 05:45:50
    214Multi-factor authentication / Authentication / Computer network security / Two-factor authentication / Security token / Security / Computer security / System software

    » GROUP TEST l Multifactor authentication Entrust IdentityGuard dentityGuard from Entrust offers a plethora of multifactor authentication methods that can be used throughout the enterprise, as well as for customer-facin

    Add to Reading List

    Source URL: www.entrust.com

    Language: English - Date: 2013-05-03 16:47:06
    215Microsoft CryptoAPI / Cryptographic Service Provider / PKCS11 / FIPS 140-2 / Security token / CSSM / PKCS / BATON / Application programming interface / Cryptography / Cryptography standards / Cryptographic software

    A Comparison of CDSA to Cryptoki Ruth Taylor ([removed]), National Security Agency February 16, 1999 Keywords: CDSA, Cryptoki, CAPI, port Abstract

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 1999-11-05 00:00:00
    216Email / Type–token distinction / Question / X Window System / Yes and no / Software / Computing / System software

    Short Survey[removed]Share your Feedback and Questions about the Toolkit. In doing so, your anonymous responses will further inform a growing learning community. Please complete and return to Farm to Table, Le Adams at

    Add to Reading List

    Source URL: www.farmtotablenm.org

    Language: English - Date: 2014-02-26 15:44:22
    217Security token / Electronic authentication / Authentication / Software token / Credential / Identity management / Security / Computer security

    An Overview of Draft SP[removed]Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-08-25 12:31:45
    218Multi-touch / Apple Inc. / IOS / IPhone / Smartphones / Apple ID / Security token / IPod Touch / IPad / Computing / Software / ITunes

    iOS Security February 2014 White Paper iOS Security

    Add to Reading List

    Source URL: www.apple.com

    Language: English - Date: 2014-10-15 23:14:40
    219Multi-touch / Apple Inc. / IOS / IPhone / Smartphones / Apple ID / Security token / IPod Touch / IPad / Computing / Software / ITunes

    iOS Security February 2014 White Paper iOS Security

    Add to Reading List

    Source URL: www.apple.com

    Language: English - Date: 2014-10-15 23:37:19
    220Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

    iOS Security October 2014 iOS 8.1 or later Contents Page 4

    Add to Reading List

    Source URL: www.apple.com

    Language: English - Date: 2014-11-11 22:02:58
    UPDATE