IT Systems  >   Business Systems  >   Security Systems  >   Identification Systems  >   AIDC  >  

Smart Media Cards

RSS Feed    Add to Google    Add to My Yahoo!
Smart Media Cards Reports
 
Smart cards: security risks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.
Posted: 17 Apr 2013 | Published: 17 Apr 2013

ComputerWeekly.com

Best Practices for mobile authentication
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to find key tips for planning, composing, and implementing a mobile authentication method in your business.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

How IoT-Powered Smart Offices Boost Efficiency and Innovation
sponsored by Aruba Networks
VIDEO: Sound IoT strategies promise better productivity and innovation, and bad ones threaten security breaches and wasted investments. Learn how to improve your IoT/big data strategy and apply to data integration, data security, collaboration, and more.
Posted: 05 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

How IoT Will Transform the Retail Industry
sponsored by Aruba Networks
VIDEO: Watch this brief video to learn how retailers can connect data from IoT devices, in-store interactions, mobile apps, and more to create and share insights across departments that boost sales and customer experiences.
Posted: 06 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

Embedded Security: Trusted Platform Module Technology Comes of Age
sponsored by Utimaco Safeware
WHITE PAPER: This paper examines the benefits that TPM chips bring to security-conscious businesses, and the ways in which this technology can elevate trusted computing to higher levels, enhancing security while simplifying usability.
Posted: 02 Feb 2009 | Published: 01 Dec 2005

Utimaco Safeware

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Securing WLANs with Two-factor Authentication
sponsored by RSA
WHITE PAPER: This paper discusses the explosion of WLANs and reviews the need to protect information in transit over wireless networks. It also reviews the security protocols available, the limitations of passwords and the importance of two-factor authentic...
Posted: 27 Sep 2007 | Published: 01 Sep 2007

RSA

Authentication Tokens: The Key to Secure PCs and Data
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper examines why smart-card-based tokens are an essential component in PC and data security solutions, and how such tokens can set the foundation for additional security solutions within your company.
Posted: 17 Oct 2006 | Published: 18 Sep 2006

Aladdin Knowledge Systems

Preparing for Integrated Physical and Logical Access Control: The Common Authenticator
sponsored by ADT
EGUIDE: This expert e-guide tells you everything you need to know about upgrading to a common authenticator system.
Posted: 05 Sep 2013 | Published: 05 Sep 2013

ADT

Converged Video Network Security
sponsored by Alcatel-Lucent
WHITE PAPER: Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself.
Posted: 20 Aug 2008 | Published: 01 Apr 2007

Alcatel-Lucent
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement