Aihe-ehdotuksia
Aihe-ehdotuksia
- Computer security
- Computers
- Access control 22
- Computer networks 8
- Passwords 6
- Security measures 6
- Database security 4
- Cryptography 2
- Data encryption (Computer science) 2
- Electronic information resources 2
- Electronic mail systems 2
- Firewalls (Computer security) 2
- Internet 2
- Languages, Artificial 2
- Programming languages (Electronic computers) 2
- Reliability 2
- Spam filtering (Electronic mail) 2
- Spyware (Computer software) 2
- Standards 2
-
1
Check Point NG next generation security administration /
Julkaistu 2002An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
2
Role-based access control
Julkaistu 2003An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
3
User's guide to cryptography and standards
Julkaistu 2005An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
4
Perfect passwords selection, protection, authentication /
Julkaistu 2006An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
5
-
6
Role-based access control
Julkaistu 2007An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
7
Logics and languages for reliability and security
Julkaistu 2010An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
8
-
9
OAuth 2.0 identity and access management patterns /
Julkaistu 2013An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
10
Instant Java password and authentication security /
Julkaistu 2013An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
11
Relation based access control /
Julkaistu 2010An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
12
-
13
Logics and languages for reliability and security
Julkaistu 2010An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
14
-
15
OAuth 2.0 identity and access management patterns /
Julkaistu 2013An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
16
Instant Java password and authentication security /
Julkaistu 2013An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
17
Relation based access control /
Julkaistu 2010An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
18
-
19
Check Point NG next generation security administration /
Julkaistu 2002An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja -
20
Role-based access control
Julkaistu 2003An electronic book accessible through the World Wide Web; click to view
Elektroninen E-kirja