Search Results - "access control"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Electronic access control by Norman, Thomas P.

    Published 2012
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 2

    Competitive political regime and Internet control : case studies of Malaysia, Thailand and Indonesia / by Yangyue, Liu

    Published 2014
    Subjects: “…Internet Access control Government policy Malaysia.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3

    Role mining in business taming role-based access control administration / by Colantonio, Alessandro

    Published 2012
    Subjects: “…Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4

    Attribute-Based Encryption and Access Control by Huang, Dijiang

    Published 2020
    Table of Contents: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Authors -- Contributors -- Part I: Foundations of Attribute-Based Encryption for Attribute-Based Access Control -- Chapter 1: Foundations of Attribute-Based Encryption -- 1.1 Attribute-Based Access Control-An ABE Approach -- 1.1.1 Motivation of ABE-Based Attribute-Based Access Control -- 1.1.2 Potentials and Issues of ABAC -- 1.2 Mathematical Background -- 1.2.1 Group and Cyclic Group -- 1.2.2 Prime-Order Bilinear Pairing -- 1.2.3 Composite-Order Bilinear Pairing…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  5. 5

    Principles of wireless access and localization by Pahlavan, Kaveh, 1951-

    Published 2013
    Subjects: “…Wireless communication systems Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 6

    Beyond cybersecurity : protecting your digital business / by Kaplan, James M.

    Published 2015
    Subjects: “…Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 7
  8. 8

    Implementing NAP and NAC security technologies the complete guide to network access control / by Hoffman, Daniel (Daniel V.), 1972-

    Published 2008
    Subjects: “…Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9
  10. 10
  11. 11

    Role engineering for enterprise security management by Coyne, Edward J., PhD

    Published 2008
    Table of Contents: “…The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12

    Building DMZs for Enterprise networks

    Published 2003
    Subjects: “…Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 13
  14. 14
  15. 15

    Digital privacy in the marketplace : perspectives on the information exchange / by Milne, George R.

    Published 2015
    Subjects: “…Internet Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16

    SECURITY AND PRIVACY IN THE INTERNET OF THINGS

    Published 2020
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  17. 17

    Enterprise level security 2 advanced topics in an uncertain world / by Foltz, Kevin E., Simpson, William Randolph, 1946-

    Published 2020
    Table of Contents: “…</p><p>4.5 Key and Credential Access Control.</p><p>4.6 Key and Credential Management.…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  18. 18

    Roadway safety : identifying needs and implementing countermeasures / by Chandler, Brian E.

    Published 2016
    Table of Contents: “…Intersections -- 5.1 Uncontrolled intersections -- 5.1.1 Sight distance improvements -- 5.1.2 Add traffic control -- 5.2 Two-way stop-controlled intersections -- 5.2.1 Stop condition conspicuity -- 5.2.2 Advanced warning -- 5.2.3 Traffic calming -- 5.2.4 Geometric design -- 5.2.5 Pavement treatments -- 5.2.6 Traffic signal to address unsignalized intersection crashes -- 5.3 Expressway intersections -- 5.3.1 Turn lane design -- 5.3.2 Alternative designs, access control -- 5.3.3 Grade separation -- 5.4 Signalized intersections -- 5.4.1 Traffic signal warrants -- 5.4.2 Traffic signal conspicuity -- 5.4.3 Wayfinding and lane placement -- 5.4.4 Signal timing -- 5.4.5 Left turns -- 5.4.6 Red light running countermeasures -- 5.4.7 Pedestrians at intersections -- 5.5 Alternative intersection solutions -- 5.5.1 Modern roundabout -- 5.5.2 Other intersections -- 5.6 Interchanges -- 5.6.1 Applicable intersection and roadway departure treatments -- 5.6.2 Additional low-cost treatments -- 5.6.3 Alternative interchange designs --…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook