Suggested Topics within your search.
Suggested Topics within your search.
Computer networking & communications
2
Computer security
2
Information technology: general issues
2
Production & quality control management
2
Banking
1
Banking Systems & Software
1
Banking system of SOA
1
Classification framework for non-banks
1
Core banking architecture overview
1
Non-banks and virtual currencies
1
Phishing
1
Protection
1
QA75 Electronic computers. Computer science
1
QA76 Computer software
1
SOA revolutionizing banking systems
1
Security
1
Security risk in online banking
1
TK Electrical engineering. Electronics Nuclear engineering
1
Threats
1
-
1by Burks, Andrea Nia“...USERNAME TAB PASSWORD RETURN Social Networking Site, User Generated Content, Screen Identity...”
Published 2009
Get full text
Get full text
Others -
2by Quach, Kim“... method of default username and password. This study uses the Mirai attack targeting Dyn in 2016...”
Published 2018
Get full text
Others -
3
-
4by Rita R. Silva, Nina Chrobot, Eryn Newman, Norbert Schwarz, Sascha Topolinski“... studies (total N = 608) we explored username complexity and trustworthiness of eBay seller profiles. Name...”
Published 2017-12-01
Get full text
Article -
5by Magda Lorena Giller MendozaSubjects: “...username...”
Published 2019-12-01
Get full text
Article -
6by Abdulrahman Alhothaily, Chunqiang Hu, Arwa Alrawais, Tianyi Song, Xiuzhen Cheng, Dechang ChenSubjects: “...one-time username...”
Published 2017-01-01
Get full text
Article -
7
-
8
-
9
-
10by Gail M. Macartney, Gail Stone, Catherine E. De Grasse, Margaret Harrison, Ian D. GrahamGet full text
Published 1997-07-01
Article -
11
-
12by Wiesław Franciszek MurawiecSubjects: “... Username Password Remember me Login NOTIFICATIONS View Subscribe LANGUAGE Select LanguageSubmit ARTICLE...”
Published 1998-12-01
Get full text
Article -
13
-
14
-
15by NS NekiSubjects: “... By Title Other Journals Login Username Password Remember me Journal Content Search Search Scope Browse...”
Published 2016-05-01
Get full text
Article -
16“..., and e-Bay, verify users’ identities through logging into the username and password. Once there exists...”
Get full text
Others -
17“...In the realm of computer security, the username/password standard is becoming increasingly...”
Get full text
Article -
18“... of web-based applications. Under the circumstance that the intruder could make use of the username...”
Get full text
Others -
19“... username and password to do identification and verification, in spite of employing SSL(Secure Sockets Layer...”
Get full text
Others -
20“... mengimplementasikan manajemen resiko didapatkan hasil hanya pada aset username dan password level yang resikonya High...”
Get full text
Article