Search Results - "access control"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Managing information security : a program for the electronic information age / by Schweitzer, James A., 1929-

    Published 1982
    Subjects: “…Computers Access control.…”
    Book
  2. 2

    Freedom of information handbook : transforming the culture of government from one of secrecy to one of openess /

    Published 2006
    Subjects:
    Book
  3. 3

    Managing risk and information security : protect to enable / by Harkins, Malcolm W

    Published 2016
    Subjects: “…Electronic information resources Access control 927…”
    Book
  4. 4

    Guide to computer network security / by Kizza, Joseph Migga

    Published 2017
    Subjects: “…Computer networks--Access control 885…”
    Book
  5. 5

    Access contested : security, identity, and resistance in Asian cyberspace /

    Published 2012
    Subjects:
    Book
  6. 6

    Mobile computing / by Kamal, Raj, 1949-

    Published 2012
    Table of Contents: “…Mobile communications : an overview -- Mobile devices and systems -- GSM and other 2G architectures -- Wireless medium access control, CDMA, 3G and 4G communication -- Mobile IP network layer -- Mobile transport layer -- Databases and mobile computing -- Data dissemination and systems for broadcasting -- Data synchronization in mobile computing systems -- Mobile devices : application servers and management -- Mobile ad-hoc and wireless sensor networks -- Mobile wireless short-range networks and mobile internet -- Mobile application languages : XML, Java, J2ME, and JavaCard -- Mobile application development platforms.…”
    Book
  7. 7

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book
  8. 8

    Business data communications and networking / by FitzGerald, Jerry

    Published 2015
    Table of Contents: “…Machine generated contents note: Chapter 1 Introduction to Data Communications 1.1 Introduction 1.2 Data Communications Networks 1.3 Network Models 1.4 Network Standards 1.5 Future Trends 1.6 Implications for Management Chapter 2 Application Layer 2.1 Introduction 2.2 Application Architectures 2.3 World Wide Web 2.4 Electronic Mail 2.5 Other applications 2.6 Implications for Management Chapter 3 Physical Layer 3.1 Introduction 3.2 Circuits 3.3 Communication Media 3.4 Digital Transmission of Digital Data 3.5 Analog Transmission of Digital 3.6 Digital Transmission of Analog Data 3.7 Implications for Management Chapter 4 Data Link Layer 4.1 Introduction 4.2 Media Access Control 4.3 Error Control 4.4 Data Link Protocols 4.5 Transmission Efficiency 4.6 Implications for Management Chapter 5 Network and Transport Layers 5.1 Introduction 5.2 Transport and Network Layer Protocols 5.3 Transport Layer Functions 5.4 Addressing 5.5 Routing 5.6 TCP/IP Example 5.7 Implications for Management Chapter 6 Network Design 6.1 Introduction 6.2 Needs Analysis 6.3 Technology Design 6.4 Cost Assessment 6.5 Implications for Management Chapter 7 Wired and Wireless Local Area Networks 7.1 Introduction 7.2 LAN Components 7.3 Wired Ethernet 7.4 Wireless Ethernet 7.5 The Best Practice LAN Design 7.6 Improving LAN Performance 7.7 Implications for Management Chapter 8 Backbone Networks 8.1 Introduction 8.2 Switched Backbone 8.3 Routed Backbones 8.4 Virtual LANs 8.5 The Best Practice Backbone Design 8.6 Improving Backbone Performance 8.7 Implications for Management Chapter 9 Wide Area Networks 9.1 Introduction 9.2 Dedicated-Circuit Networks 9.3 Packet-Switched Networks 9.4 Virtual Private Networks 9.5 The Best Practice WAN Design 9.6 Improving WAN Performance 9.7 Implications for Management Chapter 10 The Internet 10.1 Introduction 10.2 How the Internet Works 10.3 Internet Access Technologies 10.4 The Future of the Internet 10.5 Implications for Management Chapter 11 Network Security 11.1 Introduction 11.2 Risk Assessment 11.3 Ensuring Business Continuity 11.4 Intrusion Prevention 11.5 Best Practice Recommendations 11.6 Implications for Management Chapter 12 Network Management 12.1 Introduction 12.2 Designing for Network Performance 12.3 Configuration Management 12.4 Performance and Fault Management 12.5 End User Support 12.6 Cost Management 12.7 Implications for Management .…”
    Cover image
    Book