Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Access control 104
- Computers 62
- Security measures 43
- Computer security 34
- Computer networks 32
- Data protection 16
- Cryptography 9
- Law and legislation 9
- Privacy, Right of 9
- Electronic data processing departments 7
- Data encryption (Computer science) 6
- Electronic information resources 6
- Firewalls (Computer security) 5
- Medical records 5
- Operating systems (Computers) 5
- Congresses 4
- Data processing 4
- Data transmission systems 4
- Internet 4
- Microcomputers 4
- Public records 4
- Automation 3
- Computer crimes 3
- Database security 3
- Management 3
- Passwords 3
- Prevention 3
- Records 3
- Biometric identification 2
- Collection management (Libraries) 2
-
41
Advances in cryptology - CRYPTO 2007 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings
Published 2007Subjects: “…Computers Access control Congresses…”
Click Here to View Status and Holdings.
Book -
42
-
43
Cryptography and security services mechanisms and applications
Published 2007Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
44
Managing Risk in Information Systems
Published 2015Subjects: “…Electronic information resources Access control…”
Click Here to View Status and Holdings.
Book -
45
Security Operations Center - Analyst Guide SIEM technology use cases and practices
Published 2017Subjects: Click Here to View Status and Holdings.
Book -
46
Privacy and data protection a comparative analysis with special reference to the Malaysian proposed law
Published 2002Subjects: “…Computer security Access control…”
Click Here to View Status and Holdings.
Book -
47
Netware login scripts the productivity tool for administrators and users
Published 1996Subjects: “…Computers Access control Passwords…”
Click Here to View Status and Holdings.
Book -
48
Cisco access lists field guide
Published 2000Subjects: “…Computer networks Access control…”
Click Here to View Status and Holdings.
Book -
49
Authentication system for secure networks
Published 1996Subjects: “…Computer Access control…”
Click Here to View Status and Holdings.
Book -
50
Client-side attacks and defen
Published 2012Subjects: “…Computer networks Access control…”
Click Here to View Status and Holdings.
Book -
51
Digital identity and access manageme technologies and framewor
Published 2012Subjects: “…Computer networks Access control…”
Click Here to View Status and Holdings.
Book -
52
Computer security management
Published 1981Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
53
Managing information security a program for the electronic information age
Published 1982Subjects: Click Here to View Status and Holdings.
Book -
54
How to prevent computer crime a guide for managers
Published 1983Subjects: Click Here to View Status and Holdings.
Book -
55
-
56
Linux firewalls
Published 2000Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
57
Internet server construction kit for Windows
Published 1995Subjects: Click Here to View Status and Holdings.
Book -
58
Hack proofing your network internet tradecraft
Published 2000Subjects: “…Electronic information resources Access control…”
Click Here to View Status and Holdings.
Book -
59
PKI implementing and managing e-security
Published 2001Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
60
Linux firewalls
Published 2002Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book