Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Access control 104
- Computers 62
- Security measures 43
- Computer security 34
- Computer networks 32
- Data protection 16
- Cryptography 9
- Law and legislation 9
- Privacy, Right of 9
- Electronic data processing departments 7
- Data encryption (Computer science) 6
- Electronic information resources 6
- Firewalls (Computer security) 5
- Medical records 5
- Operating systems (Computers) 5
- Congresses 4
- Data processing 4
- Data transmission systems 4
- Internet 4
- Microcomputers 4
- Public records 4
- Automation 3
- Computer crimes 3
- Database security 3
- Management 3
- Passwords 3
- Prevention 3
- Records 3
- Biometric identification 2
- Collection management (Libraries) 2
-
1
Role-based access control
Published 2007Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
2
Role-based access controls
Published 2003Subjects: “…Computer networks Access control…”
Click Here to View Status and Holdings.
Book -
3
Access control, security, and trust a logical approach
Published 2011Subjects: Click Here to View Status and Holdings.
Book -
4
Adaptive cryptographic access control
Published 2010Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
5
Computer security solutions
Published 1990Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
6
Computer security solutions
Published 1990Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
7
Role mining in business taming role-based access control administration
Published 2012Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
8
Differential cryptanalysis of the data encryption standard
Published 1993Subjects: Click Here to View Status and Holdings.
Book -
9
Facilitating access to the web of data a guide for librarians
Published 2011Subjects: “…Collection management (Libraries) Access control…”
Click Here to View Status and Holdings.
Book -
10
Data encryption
Published 1980Subjects: “…Computers Access control Passwords…”
Click Here to View Status and Holdings.
Book -
11
Cryptography an introduction to computer security
Published 1989Subjects: Click Here to View Status and Holdings.
Book -
12
Modern cryptography theory and practice
Published 2004Subjects: “…Cryptography Access control…”
Click Here to View Status and Holdings.
Book -
13
Linux firewalls Steve Suehring, Robert Ziegler
Published 2006Subjects: “…Firewalls (Computer security) Access control…”
Click Here to View Status and Holdings.
Book -
14
-
15
Mechanics of user identification and authentication fundamentals of identity management
Published 2007Subjects: “…Computers Access control…”
Click Here to View Status and Holdings.
Book -
16
Insider threats in cyber security
Published 2010Subjects: “…Computer networks Access control…”
Click Here to View Status and Holdings.
Book -
17
The hacker's handbook the strategy behind breaking into and defending networks
Published 2004Subjects: Click Here to View Status and Holdings.
Book -
18
Handbook of applied cryptography
Published 1997Subjects: “…Computers Handbooks, manuals, etc Access control…”
Click Here to View Status and Holdings.
Book -
19
The underground guide to computer security slightly askew advice on protecting your PC and what s on it
Published 1996Subjects: “…Microcomputers Access control…”
Click Here to View Status and Holdings.
Book -
20