Search

Your search keyword '"COMPUTER access control software"' showing total 397 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER access control software" Remove constraint Descriptor: "COMPUTER access control software"
397 results on '"COMPUTER access control software"'

Search Results

1. INTERVIEW WITH SECRETARY OF THE AIR FORCE FRANK KENDALL.

2. A Modular Robotic Platform for Biological Research: Cell Culture Automation and Remote Experimentation.

3. Enterprise buyer's guide: How to choose videoconferencing software.

4. 'I tried to take my phone off my daughter, and i got hit in the face': a qualitative study of parents' challenges with adolescents' screen use and a toolbox of their tips.

5. BIG BOOK: THE SECURITY INDUSTRY'S PRODUCT GUIDE • WINTER 2024.

6. Gebäudesicherheit durch Zutrittskontrolle mit Sensorschleusen.

7. The Realities of Cloud-based Access Control Technology and Applications.

8. Digital documentation: Avoiding a business deduction disallowance.

9. Genetec ranks second in latest Omdia report.

10. Information Flow Control in Software DB Units Based on Formal Verification.

11. Linking norms, ratings, and relations of words and concepts across multiple language varieties.

12. Blockchain Based Model for Security.

13. Safeguarding the Cybersecurity of Your Access Control Systems: Protecting an organisation's physical access control system from cyber threats requires close internal collaboration, writes HID End-User and Consultants Business Manager, Steven Commander.

14. On-the-Fly Repairing of Atomicity Violations in ARINC 653 Software.

15. Physische Gefahrenabwehr in Rechenzentren.

16. Aplicación de UML y SCRUM al desarrollo del software sobre control de acceso.

17. CMS data access and usage studies at PIC Tier-1 and CIEMAT Tier-2.

18. The Quest to solve the HL-LHC data access puzzle.

19. Attribute-based Encryption for Cloud Computing Access Control: A Survey.

20. IDOT: Black-Box Detection of Access Control Violations in Web Applications.

21. Allegion Launches Schlage XE360™ Series Wireless Locks.

22. Allegion Launches Schlage XE360™ Series Wireless Locks.

23. Springshare Partners with RemoteLock to Sync with LibCal Spaces.

24. How Interactive Mapping Enhances School Safety.

25. Secure access of resources in software‐defined networks using dynamic access control list.

26. An attribute-based lightweight cloud data access control using hypergraph structure.

27. Cursor Click Modality in an Accelerometer-Based Computer Access Device.

28. Security Analysis of the Access Control Solution of NDN Using BAN Logic.

29. Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems.

30. ACCESS CONTROL & DOOR HARDWARE.

32. CLOUD PLATFORM FOR ROBOTARIUMS WITH WIRELESS COVERAGE NETWORKS, ENSURING SERVICE ROBOTS WITH PARALLEL SIMULATION.

33. Dive Mechanic: Bringing 3D virtual experimentation using biomechanical modelling to elite level diving with the Workspace workflow engine.

34. Visualization and Sharing of 3D Digital Outcrop Models to Promote Open Science.

35. FEATURED PRODUCT SHOWCASE.

36. Assessing Access Control Risk for mHealth: A Delphi Study to Categorize Security of Health Data and Provide Risk Assessment for Mobile Apps.

37. Policy expressions and the bottom-up design of computing policies.

38. An Architecture for Providing Data Usage and Access Control in Data Sharing Ecosystems.

39. Providing Ontology-Based Access Control for Cloud Data by Exploiting Subsumption Property among Domains of Access Control.

40. Investigators from University of California Los Angeles (UCLA) Have Reported New Data on Telerehabilitation (Outcomes of Telerehabilitation Versus In-office Training With Magnification Devices for Low Vision: a Randomized Controlled Trial).

41. Linking Norms, Ratings, and Relations of Words and Concepts Across Multiple Language Varieties (Updated April 12, 2024).

42. READERS' CHOICE AWARDS.

43. Does Interoperability Matter When Integrating an Access Control System? The short answer is yes,but it is crucial to know why and where.

44. Implementation of web scraping on GitHub task monitoring system.

45. VENDING MACHINES deliver for MRO PARTS MANAGEMENT.

46. OAuthkeeper: An Authorization Framework for Software Defined Network.

47. A software for managing chemical processes in a multi-user laboratory.

48. Make safety awareness a priority: Use a login software in your research facility.

49. An efficient key management scheme for user access control in outsourced databases.

50. ResVMAC: A Novel Medium Access Control Protocol for Vehicular Ad hoc Networks.

Catalog

Books, media, physical & digital resources