Role mining in business taming role-based access control administration /
Saved in:
| Main Author: | |
|---|---|
| Corporate Author: | |
| Other Authors: | , |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Singapore :
World Scientific Pub. Co.,
2012.
|
| Subjects: | |
| Online Access: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
No Tags, Be the first to tag this record!
|
Similar Items: Role mining in business
- Beyond cybersecurity : protecting your digital business /
- Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
- Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Security /
- Integrated security systems design concepts, specifications, and implementation /
- Nessus network auditing
- Cisco security specialist's guide to PIX Firewall