Security token

Results: 1367



#Item
951Security Management System  MHPD Module 1

Security Management System MHPD Module 1

Add to Reading List

Source URL: omh.ny.gov

Language: English - Date: 2011-01-27 11:50:41
952Sample Rubrics for Positive Encouragement for Active Bystanders Grades 1-6 Behavior Harassment or Considerations Severe Physical

Sample Rubrics for Positive Encouragement for Active Bystanders Grades 1-6 Behavior Harassment or Considerations Severe Physical

Add to Reading List

Source URL: www.k12connections.iptv.org

Language: English - Date: 2008-02-27 10:19:48
953“Geneva”  Claims Based Access Platform Beta 1 Datasheet Microsoft Identity and Access solutions are a set of platform technologies and products designed to help organizations manage user identities and associated acc

“Geneva” Claims Based Access Platform Beta 1 Datasheet Microsoft Identity and Access solutions are a set of platform technologies and products designed to help organizations manage user identities and associated acc

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2008-10-20 12:56:11
954Meteor 4 Token Provider Implementation Guide  Version 1.2 Contributors: Richard Allen

Meteor 4 Token Provider Implementation Guide Version 1.2 Contributors: Richard Allen

Add to Reading List

Source URL: www.meteornetwork.org

Language: English - Date: 2013-05-09 10:14:08
955INFORMATION RESOURCES ACCEPTABLE USE POLICY

INFORMATION RESOURCES ACCEPTABLE USE POLICY

Add to Reading List

Source URL: www.utpa.edu

Language: English - Date: 2014-05-06 21:01:17
956Security / Computing / Information / Metadata / Open Archives Initiative Protocol for Metadata Harvesting / Open access / Access token / Authentication / User / Archival science / Digital libraries / Internet protocols

Requester Information Name: E-Mail: Position:

Add to Reading List

Source URL: ands.org.au

Language: English - Date: 2011-09-25 21:47:49
957NIST Special Publication[removed]

NIST Special Publication[removed]

Add to Reading List

Source URL: gpo.gov

Language: English - Date: 2011-01-06 14:07:16
958IAM Online Multifactor Authentication in Higher Education Tuesday, December 6, 2011 – 3 p.m. ET Steven Burke, Federal Student Aid, US Dept. of Education Shilen Patel, Senior IT Analyst, Duke University Miguel Soldi, In

IAM Online Multifactor Authentication in Higher Education Tuesday, December 6, 2011 – 3 p.m. ET Steven Burke, Federal Student Aid, US Dept. of Education Shilen Patel, Senior IT Analyst, Duke University Miguel Soldi, In

Add to Reading List

Source URL: www.incommon.org

Language: English - Date: 2011-12-06 15:07:19
959The New York State Office of Mental Health uses an “adaptive authentication” process to secure the login and access to some sensitive systems. What is Adaptive Authentication? Adaptive authentication provides two-fac

The New York State Office of Mental Health uses an “adaptive authentication” process to secure the login and access to some sensitive systems. What is Adaptive Authentication? Adaptive authentication provides two-fac

Add to Reading List

Source URL: omh.ny.gov

Language: English - Date: 2011-10-13 14:14:16
960Microsoft Word - oasis[removed]wss-username-token-profile-1.0.doc

Microsoft Word - oasis[removed]wss-username-token-profile-1.0.doc

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2004-03-16 19:21:06