Role mining in business taming role-based access control administration /
Guardat en:
| Autor principal: | |
|---|---|
| Autor corporatiu: | |
| Altres autors: | , |
| Format: | Electrònic eBook |
| Idioma: | anglès |
| Publicat: |
Singapore :
World Scientific Pub. Co.,
2012.
|
| Matèries: | |
| Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
| Etiquetes: |
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars: Role mining in business
- Beyond cybersecurity : protecting your digital business /
- Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
- Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Security /
- Integrated security systems design concepts, specifications, and implementation /
- Nessus network auditing
- Cisco security specialist's guide to PIX Firewall