Stiegler

Results: 55



#Item
21Computer crimes / Phishing / Spamming / Password / Transaction authentication number / Two-factor authentication / Login / Authentication / Security / Access control / Social engineering

Phishing Prevention with Hybrid Authentication/Authorization Marc Stiegler Abstract Phishing is now widely recognized as the number one threat to the enterprise.Two Factor Authentication, the supposed solution to this am

Add to Reading List

Source URL: skyhunter.com

Language: English - Date: 2014-01-27 12:48:27
22Bernard Stiegler / Deconstruction / Transhumanism / Critical theory / Posthumanism / Cyberculture / Technology / Culture theory / Philosophy / Culture / Continental philosophy

Cardiff School of English, Communication & Philosophy Centre for Critical and Cultural Theory Zoontotechnics (Animality/Technicity) 12-14th May 2010 Centre for Critical & Cultural Theory - 20th Anniversary

Add to Reading List

Source URL: www.cardiff.ac.uk

Language: English - Date: 2013-06-13 08:23:24
23Stiegler / Shapiro / Concurrency control / Object-capability model / Data / Information / Computing / Year of birth missing / CapDesk / Marc Stiegler

Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2006-09-01 02:03:44
24Anti-psychiatry / Mind / Philosophy of sexuality / Freudian psychology / Félix Guattari / Bernard Stiegler / Anti-Oedipus / Individuation / Gilbert Simondon / Philosophy / Psychoanalysis / Gilles Deleuze

PARRHESIA WWW.PARRHESIAJOURNAL.ORG iSSUE[removed]

Add to Reading List

Source URL: www.parrhesiajournal.org

Language: English - Date: 2014-11-13 16:52:16
25Electronics / Email / Technology / Digital media

Rich Sharing for the Web Marc Stiegler HP Laboratories HPLKeyword(s): secure cooperation, usable security

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2009-07-21 21:46:00
26Daseinsanalysis / Philosophy of technology / Bernard Stiegler / Media studies / Posthuman / Martin Heidegger / Technology / Individuation / Gestell / Philosophy / Continental philosophy / Deconstruction

Annual Conference of the Australasian Society for Continental Philosophy

Add to Reading List

Source URL: act.maydaygroup.org

Language: English - Date: 2014-07-11 20:19:44
27Stiegler / Shapiro / Concurrency control / Object-capability model / Data / Information / Computing / Year of birth missing / CapDesk / Marc Stiegler

Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control by Mark Samuel Miller

Add to Reading List

Source URL: erights.org

Language: English - Date: 2006-09-01 02:03:44
28Antivirus software / Computer virus / Malware / Macro virus / CapDesk / Microsoft Windows / Spyware / Microsoft Excel / Principle of least privilege / System software / Software / Computing

Polaris: Toward Virus Safe Computing for Windows XP Marc Stiegler, Alan H. Karp, Ka-Ping Yee1, Mark Miller2 Hewlett-Packard Laboratories Palo Alto, California Viruses, those nasty pieces of software that can run when you

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2004-12-13 10:58:46
29

Les stratégies digitales du marketing social dans le domaine de l’environnement Marie Lebec, Oriane Petit, Hannah Stiegler 2013

Add to Reading List

Source URL: po-st.fr

Language: French - Date: 2014-03-13 11:51:08
    30MPEG / MPEG-7 / Linux kernel / K-nearest neighbor algorithm / Kernel methods / Kernel / Support vector machine / Mach / Statistics / Artificial intelligence / Computer architecture

    JOANNEUM RESEARCH and Vienna University of Technology at TRECVID 2011: Semantic Indexing and Instance Search Werner Bailer∗ , Robert Sorschag† , Felix Lee∗ , Harald Stiegler∗ , Georg Schwendt∗ ∗ JOANNEUM

    Add to Reading List

    Source URL: www-nlpir.nist.gov

    Language: English - Date: 2012-01-10 13:32:28
    UPDATE