Competitive political regime and Internet control : case studies of Malaysia, Thailand and Indonesia /
Sábháilte in:
Príomhchruthaitheoir: | Yangyue, Liu (Údar) |
---|---|
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Newcastle upon Tyne, England :
Cambridge Scholars Publishing,
2014.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Access denied the practice and policy of global Internet filtering /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Access contested : security, identity, and resistance in Asian cyberspace /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Best practices in government information a global perspective /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Sorting out deregulation protecting free speech and Internet access in the United States, Germany, and Japan /
de réir: Kim, Chae-yŏng, 1968-
Foilsithe / Cruthaithe: (2002)
de réir: Kim, Chae-yŏng, 1968-
Foilsithe / Cruthaithe: (2002)
The net delusion the dark side of internet freedom /
de réir: Morozov, Evgeny
Foilsithe / Cruthaithe: (2011)
de réir: Morozov, Evgeny
Foilsithe / Cruthaithe: (2011)
Identity management for internet of things /
de réir: Mahalle, Parikshit N., et al.
Foilsithe / Cruthaithe: (2015)
de réir: Mahalle, Parikshit N., et al.
Foilsithe / Cruthaithe: (2015)
Archival silences : missing, lost and, uncreated archives /
Foilsithe / Cruthaithe: (2021)
Foilsithe / Cruthaithe: (2021)
Role mining in business taming role-based access control administration /
de réir: Colantonio, Alessandro
Foilsithe / Cruthaithe: (2012)
de réir: Colantonio, Alessandro
Foilsithe / Cruthaithe: (2012)
Role-based access control
de réir: Ferraiolo, David
Foilsithe / Cruthaithe: (2003)
de réir: Ferraiolo, David
Foilsithe / Cruthaithe: (2003)
Role-based access control
de réir: Ferraiolo, David
Foilsithe / Cruthaithe: (2007)
de réir: Ferraiolo, David
Foilsithe / Cruthaithe: (2007)
Access Denied : The Practice and Policy of Global Internet Filtering /
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
The Social Dynamics of Open Data /
Foilsithe / Cruthaithe: (2018)
Foilsithe / Cruthaithe: (2018)
Access Controlled : The Shaping of Power, Rights, and Rule in Cyberspace /
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Effect of the HIPAA privacy rule on health research proceedings of a workshop presented to the National Cancer Policy Forum /
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Internet freedom software and illicit activity : supporting human rights without enabling criminals /
de réir: Romanosky, Sasha
Foilsithe / Cruthaithe: (2015)
de réir: Romanosky, Sasha
Foilsithe / Cruthaithe: (2015)
Transparency and secrecy a reader linking literature and contemporary debate /
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Networks and states the global politics of internet governance /
de réir: Mueller, Milton
Foilsithe / Cruthaithe: (2010)
de réir: Mueller, Milton
Foilsithe / Cruthaithe: (2010)
Relation based access control /
de réir: Zhang, Rui
Foilsithe / Cruthaithe: (2010)
de réir: Zhang, Rui
Foilsithe / Cruthaithe: (2010)
OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy way /
de réir: Thangasamy, Indira
Foilsithe / Cruthaithe: (2011)
de réir: Thangasamy, Indira
Foilsithe / Cruthaithe: (2011)
Institutions guaranteeing access to information : OECD and MENA region /
Foilsithe / Cruthaithe: (2019)
Foilsithe / Cruthaithe: (2019)
Access to information in Africa law, culture and practice /
Foilsithe / Cruthaithe: (2013)
Foilsithe / Cruthaithe: (2013)
Digital privacy in the marketplace : perspectives on the information exchange /
de réir: Milne, George R.
Foilsithe / Cruthaithe: (2015)
de réir: Milne, George R.
Foilsithe / Cruthaithe: (2015)
Building DMZs for Enterprise networks
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
Beyond cybersecurity : protecting your digital business /
de réir: Kaplan, James M.
Foilsithe / Cruthaithe: (2015)
de réir: Kaplan, James M.
Foilsithe / Cruthaithe: (2015)
Who controls the Internet? illusions of a borderless world /
de réir: Goldsmith, Jack L.
Foilsithe / Cruthaithe: (2006)
de réir: Goldsmith, Jack L.
Foilsithe / Cruthaithe: (2006)
Government information in Canada : access and stewardship /
Foilsithe / Cruthaithe: (2019)
Foilsithe / Cruthaithe: (2019)
OAuth 2.0 identity and access management patterns /
de réir: Spasovski, Martin
Foilsithe / Cruthaithe: (2013)
de réir: Spasovski, Martin
Foilsithe / Cruthaithe: (2013)
Deployment guide series IBM Tivoli Security Compliance Manager /
de réir: Bücker, Axel
Foilsithe / Cruthaithe: (2005)
de réir: Bücker, Axel
Foilsithe / Cruthaithe: (2005)
Recent advances in providing QoS and reliability in the future Internet backbone
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Internet policies and issues
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Security assessment case studies for implementing the NSA lAM /
de réir: Rogers, Russ
Foilsithe / Cruthaithe: (2004)
de réir: Rogers, Russ
Foilsithe / Cruthaithe: (2004)
Access Contested : Security, Identity, and Resistance in Asian Cyberspace /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Freedom of Information Act.
de réir: Singleton, Susan
Foilsithe / Cruthaithe: (2008)
de réir: Singleton, Susan
Foilsithe / Cruthaithe: (2008)
Measurement and reduction of administrative burdens in Greece : an overview of 13 sectors /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
The devil's long tail : religious and other radicals in the internet marketplace /
de réir: Stevens, David (Lecturer in political theory), et al.
Foilsithe / Cruthaithe: (2015)
de réir: Stevens, David (Lecturer in political theory), et al.
Foilsithe / Cruthaithe: (2015)
Internet freedom & political space /
de réir: Tkacheva, Olesya
Foilsithe / Cruthaithe: (2013)
de réir: Tkacheva, Olesya
Foilsithe / Cruthaithe: (2013)
Broadband access : wireline and wireless, alternatives for internet services /
de réir: Gorshe, Steve
Foilsithe / Cruthaithe: (2014)
de réir: Gorshe, Steve
Foilsithe / Cruthaithe: (2014)
Perfect passwords selection, protection, authentication /
de réir: Burnett, Mark
Foilsithe / Cruthaithe: (2006)
de réir: Burnett, Mark
Foilsithe / Cruthaithe: (2006)
Medical eligibility criteria for contraceptive use
Foilsithe / Cruthaithe: (2009)
Foilsithe / Cruthaithe: (2009)
Míreanna comhchosúla
-
Access denied the practice and policy of global Internet filtering /
Foilsithe / Cruthaithe: (2008) -
Access contested : security, identity, and resistance in Asian cyberspace /
Foilsithe / Cruthaithe: (2012) -
Best practices in government information a global perspective /
Foilsithe / Cruthaithe: (2008) -
Access contested security, identity, and resistance in Asian cyberspace information revolution and global politics /
Foilsithe / Cruthaithe: (2012) -
Sorting out deregulation protecting free speech and Internet access in the United States, Germany, and Japan /
de réir: Kim, Chae-yŏng, 1968-
Foilsithe / Cruthaithe: (2002)