Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Access control 13
- Computer networks 12
- Security measures 11
- Computers 5
- Computer security 3
- COMPUTERS / Security / General 2
- Internet 2
- Access 1
- COMPUTERS / Computer Engineering 1
- COMPUTERS / Cryptography 1
- COMPUTERS / Database Management / Data Mining 1
- COMPUTERS / Groupware 1
- COMPUTERS / Information Technology 1
- COMPUTERS / Networking / General 1
- COMPUTERS / Networking / Security 1
- Computer network architectures 1
- Computer network protocols 1
- Data encryption (Computer science) 1
- Data protection 1
- Electronic locking devices 1
- Government policy 1
- Heterogeneous distributed computing systems 1
- Identification 1
- Industries 1
- Information resources management 1
- Information storage and retrieval systems 1
- Internet of things 1
- Java (Computer program language) 1
- Management 1
- Management information systems 1
-
1
Electronic access control
Published 2012An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Competitive political regime and Internet control : case studies of Malaysia, Thailand and Indonesia /
Published 2014Subjects: “…Internet Access control Government policy Malaysia.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Role mining in business taming role-based access control administration /
Published 2012Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Attribute-Based Encryption and Access Control
Published 2020Table of Contents: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Authors -- Contributors -- Part I: Foundations of Attribute-Based Encryption for Attribute-Based Access Control -- Chapter 1: Foundations of Attribute-Based Encryption -- 1.1 Attribute-Based Access Control-An ABE Approach -- 1.1.1 Motivation of ABE-Based Attribute-Based Access Control -- 1.1.2 Potentials and Issues of ABAC -- 1.2 Mathematical Background -- 1.2.1 Group and Cyclic Group -- 1.2.2 Prime-Order Bilinear Pairing -- 1.2.3 Composite-Order Bilinear Pairing…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
5
Principles of wireless access and localization
Published 2013Subjects: “…Wireless communication systems Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Beyond cybersecurity : protecting your digital business /
Published 2015Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
-
8
Implementing NAP and NAC security technologies the complete guide to network access control /
Published 2008Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
-
10
Integrated security systems design concepts, specifications, and implementation /
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Role engineering for enterprise security management
Published 2008Table of Contents: “…The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
Building DMZs for Enterprise networks
Published 2003Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
-
14
-
15
Digital privacy in the marketplace : perspectives on the information exchange /
Published 2015Subjects: “…Internet Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
SECURITY AND PRIVACY IN THE INTERNET OF THINGS
Published 2020Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
17
Enterprise level security 2 advanced topics in an uncertain world /
Published 2020Table of Contents: “…</p><p>4.5 Key and Credential Access Control.</p><p>4.6 Key and Credential Management.…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
18
Roadway safety : identifying needs and implementing countermeasures /
Published 2016Table of Contents: “…Intersections -- 5.1 Uncontrolled intersections -- 5.1.1 Sight distance improvements -- 5.1.2 Add traffic control -- 5.2 Two-way stop-controlled intersections -- 5.2.1 Stop condition conspicuity -- 5.2.2 Advanced warning -- 5.2.3 Traffic calming -- 5.2.4 Geometric design -- 5.2.5 Pavement treatments -- 5.2.6 Traffic signal to address unsignalized intersection crashes -- 5.3 Expressway intersections -- 5.3.1 Turn lane design -- 5.3.2 Alternative designs, access control -- 5.3.3 Grade separation -- 5.4 Signalized intersections -- 5.4.1 Traffic signal warrants -- 5.4.2 Traffic signal conspicuity -- 5.4.3 Wayfinding and lane placement -- 5.4.4 Signal timing -- 5.4.5 Left turns -- 5.4.6 Red light running countermeasures -- 5.4.7 Pedestrians at intersections -- 5.5 Alternative intersection solutions -- 5.5.1 Modern roundabout -- 5.5.2 Other intersections -- 5.6 Interchanges -- 5.6.1 Applicable intersection and roadway departure treatments -- 5.6.2 Additional low-cost treatments -- 5.6.3 Alternative interchange designs --…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook