Role-based access control
Enregistré dans:
| Auteur principal: | |
|---|---|
| Collectivité auteur: | |
| Autres auteurs: | , |
| Format: | Électronique eBook |
| Langue: | anglais |
| Publié: |
Boston :
Artech House,
c2003.
|
| Collection: | Artech House computer security series.
|
| Sujets: | |
| Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires: Role-based access control
- Relation based access control /
- Role-based access control
- Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
- Deployment guide series IBM Tivoli Security Compliance Manager /
- Intrusion prevention and active response deploying network and host IPS /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /