Software token

Results: 476



#Item
51Cyberwarfare / Privileged Identity Management / Cryptography / Lieberman Software / Data security / Department of Defense Information Assurance Certification and Accreditation Process / Password / Security token / Security controls / Security / Computer security / Identity management

DIACAP Compliance Enterprise Random Password Manager Introduction Lieberman Software’s Privileged Identity Management solutions help federal government organizations comply with the DoD Information

Add to Reading List

Source URL: www.liebsoft.com

Language: English - Date: 2011-06-28 11:24:58
52Software quality / Fuzz testing / Genetic algorithm / Session / Fitness function / Access token / Fitness landscape / Communications protocol / Code coverage / Software testing / Computing / Software engineering

Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing Jared D. DeMott Computer Science Michigan State University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
53Computer security / Windows NT / Access token / Privilege escalation / Architecture of Windows NT / Kernel / Linux kernel / Windows Vista / Operating system / Microsoft Windows / Software / Computing

TECHNICAL WHITE PAPER Easy local Windows Kernel exploitation Abstract In this paper I detail how to easily exploit some kind of windows kernel vulnerabilities. This is

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 17:40:37
54Security / Two-factor authentication / Solid-state drive / Cryptographic software / DataLock Technology / Password / Radio-frequency identification / Security token / Computing / Disk encryption / Technology

datal o c ke r.c o m DL3 ™

Add to Reading List

Source URL: datalocker.com

Language: English - Date: 2014-11-25 09:35:42
55Credit card / Transaction authentication number / System software / Security / Computing / Pseudonymous remailer / Access token / Token coin

Untraceable Nym Creation on the Freedom 2.0 Network™ Russell Samuels Ed Hawco November 1, 2000 Version 2.0

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:41:54
56IronKey / USB / PKCS / Key / Password / Skype security / Security token / Cryptography / Public-key cryptography / Cryptographic software

Microsoft Word - 11c - H350 SP .doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-13 09:22:01
57Pluggable authentication module / Linux PAM / Secure Shell / Kerberos / Password / Security token / Access token / Authentication / Software / Computer security / System software

Stanford University July 26, 2014 AFS and PAM

Add to Reading List

Source URL: www.eyrie.org

Language: English - Date: 2014-07-26 03:56:11
58Computer security / WS-Security / Web services / Identity management / Identity management systems / SOAP / OASIS / Security token / WS-SecurityPolicy / Computing / Security / System software

Microsoft Word - oasiswss-soap-message-security-1.0.doc

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-03-16 19:21:46
59Apple Inc. / ITunes / Multi-touch / IPhone / Apple ID / IPod Touch / Cisco IOS / Security token / IPad / IOS / Software / Computing

iOS Security October 2014 iOS 8.1 or later Contents Page 4

Add to Reading List

Source URL: images.apple.com

Language: English - Date: 2015-03-12 04:26:13
60Unix / Cryptographic software / System administration / One-time password / Password / Security token / Two-factor authentication / Shadow password / Challenge-response authentication / Computer security / Security / Access control

One-Time Passwords Hal Pomeranz Deer Run Associates One-Time Passwords – Unix Security Track All material in this course Copyright © Hal Pomeranz and Deer Run Associates,

Add to Reading List

Source URL: www.deer-run.com

Language: English - Date: 2001-02-08 01:03:21
UPDATE