Suggested Topics within your search.
Suggested Topics within your search.
- Access control
- Computers
- Computer security 16
- Security measures 15
- Computer networks 14
- Internet 9
- Censorship 8
- Government policy 6
- Penetration testing (Computer security) 5
- Passwords 4
- Acces 3
- Censure 3
- Contrôle 3
- Cyberspace 3
- Data encryption (Computer science) 3
- Ordinateurs 3
- Politique gouvernementale 3
- Testing 3
- Zensur 3
- COMPUTERS 2
- Cyberespace 2
- Database security 2
- Firewalls (Computer security) 2
- Freedom of information 2
- Political aspects 2
- Security 2
- 05.20 communication and society 1
- COMPUTERS / Database Management / Data Mining 1
- COMPUTERS / Security / General 1
- Censuur 1
-
21
Attribute-Based Encryption and Access Control
Published 2020Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
22
-
23
Access Contested : Security, Identity, and Resistance in Asian Cyberspace /
Published 2012Full text available:
Electronic eBook -
24
Access Controlled : The Shaping of Power, Rights, and Rule in Cyberspace /
Published 2010Full text available:
Electronic eBook -
25
Access Denied : The Practice and Policy of Global Internet Filtering /
Published 2008Full text available:
Electronic eBook -
26
-
27
Check Point NG next generation security administration /
Published 2002An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
28
-
29
-
30
Role-based access control
Published 2003An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
31
Outsourcing information security
Published 2004An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
32
User's guide to cryptography and standards
Published 2005An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
33
Perfect passwords selection, protection, authentication /
Published 2006An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
34
-
35
-
36
-
37
-
38
-
39
Role-based access control
Published 2007An electronic book accessible through the World Wide Web; click to view
Electronic eBook