Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Computers
- Access control 11
- Computer networks 4
- Passwords 3
- Security measures 3
- Database security 2
- Cryptography 1
- Data encryption (Computer science) 1
- Electronic information resources 1
- Electronic mail systems 1
- Firewalls (Computer security) 1
- Internet 1
- Languages, Artificial 1
- Programming languages (Electronic computers) 1
- Reliability 1
- Spam filtering (Electronic mail) 1
- Spyware (Computer software) 1
- Standards 1
-
1
Logics and languages for reliability and security
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
-
3
OAuth 2.0 identity and access management patterns /
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Instant Java password and authentication security /
Published 2013An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Relation based access control /
Published 2010An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
-
7
Check Point NG next generation security administration /
Published 2002An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Role-based access control
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
User's guide to cryptography and standards
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Perfect passwords selection, protection, authentication /
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
-
12
Role-based access control
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic eBook