Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Access control 97
- Computers 38
- Computer networks 30
- Security measures 30
- Computer security 26
- Government information 15
- Internet 14
- Medical records 14
- Law and legislation 12
- Government policy 11
- Privacy, Right of 11
- Freedom of information 10
- Data protection 9
- Censorship 8
- Public records 8
- Research 8
- Confidential communications 5
- Data processing 5
- Electronic information resources 5
- Information services 5
- Management 5
- Medical informatics 5
- Moral and ethical aspects 5
- Penetration testing (Computer security) 5
- Transparency in government 5
- Acces 4
- COMPUTERS / Security / General 4
- Contrôle 4
- Data encryption (Computer science) 4
- Information technology 4
-
1
Access Controlled : The Shaping of Power, Rights, and Rule in Cyberspace /
Published 2010Table of Contents: “…Beyond denial : introducing next-generation information access controls / Ronald Deibert and Rafal Rohozinski -- Control and subversion in Russian cyberspace / Ronald Deibert and Rafal Rohozinski -- The EU data retention directive in an era of Internet surveillance / Hal Roberts and John Palfrey -- Barriers to cooperation : an analysis of the origins of international efforts to protect children online / Nart Villeneuve -- Intermediary censorship / Ethan Zuckerman -- Protecting privacy and expression online : can the Global Network Initiative embrace the character of the Net? …”
Full text available:
Electronic eBook -
2
Electronic access control
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Role-based access control
Published 2003Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Effect of the HIPAA privacy rule on health research proceedings of a workshop presented to the National Cancer Policy Forum /
Published 2006Subjects: “…Health Research Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Role-based access control
Published 2007Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Best practices in government information a global perspective /
Published 2008Subjects: “…Government information Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Competitive political regime and Internet control : case studies of Malaysia, Thailand and Indonesia /
Published 2014Subjects: “…Internet Access control Government policy Malaysia.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy way /
Published 2011Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Relation based access control /
Published 2010Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Role mining in business taming role-based access control administration /
Published 2012Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Deployment guide series IBM Tivoli Security Compliance Manager /
Published 2005Subjects: “…Business enterprises Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
OAuth 2.0 identity and access management patterns /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Security assessment case studies for implementing the NSA lAM /
Published 2004Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Perfect passwords selection, protection, authentication /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Instant Metasploit starter
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Instant Java password and authentication security /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Attribute-Based Encryption and Access Control
Published 2020Table of Contents: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Authors -- Contributors -- Part I: Foundations of Attribute-Based Encryption for Attribute-Based Access Control -- Chapter 1: Foundations of Attribute-Based Encryption -- 1.1 Attribute-Based Access Control-An ABE Approach -- 1.1.1 Motivation of ABE-Based Attribute-Based Access Control -- 1.1.2 Potentials and Issues of ABAC -- 1.2 Mathematical Background -- 1.2.1 Group and Cyclic Group -- 1.2.2 Prime-Order Bilinear Pairing -- 1.2.3 Composite-Order Bilinear Pairing…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
18
Check Point NG next generation security administration /
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
-
20
Linux firewalls attack detection and response with iptables, psad, and fwsnort /
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook