Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks
- Access control 25
- Security measures 25
- Computers 14
- Computer security 11
- COMPUTERS / Security / General 4
- Electronic commerce 3
- Testing 3
- Business enterprises 2
- Data encryption (Computer science) 2
- Data protection 2
- Electronic information resources 2
- Information storage and retrieval systems 2
- Penetration testing (Computer security) 2
- Access 1
- Automation 1
- COMPUTERS / Computer Graphics / Game Programming & Design 1
- COMPUTERS / Cryptography 1
- COMPUTERS / Database Management / Data Mining 1
- COMPUTERS / Groupware 1
- COMPUTERS / Information Technology 1
- COMPUTERS / Networking / Security 1
- Cloud computing 1
- Computer crimes 1
- Computer hackers 1
- Computer network architectures 1
- Computer network protocols 1
- Data transmission systems 1
- Database security 1
- Heterogeneous distributed computing systems 1
-
1
Role-based access control
Published 2003Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Role-based access control
Published 2007Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy way /
Published 2011Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Role mining in business taming role-based access control administration /
Published 2012Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Deployment guide series IBM Tivoli Security Compliance Manager /
Published 2005Subjects: “…Business enterprises Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Attribute-Based Encryption and Access Control
Published 2020Table of Contents: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Authors -- Contributors -- Part I: Foundations of Attribute-Based Encryption for Attribute-Based Access Control -- Chapter 1: Foundations of Attribute-Based Encryption -- 1.1 Attribute-Based Access Control-An ABE Approach -- 1.1.1 Motivation of ABE-Based Attribute-Based Access Control -- 1.1.2 Potentials and Issues of ABAC -- 1.2 Mathematical Background -- 1.2.1 Group and Cyclic Group -- 1.2.2 Prime-Order Bilinear Pairing -- 1.2.3 Composite-Order Bilinear Pairing…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
7
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
Published 2014Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Beyond cybersecurity : protecting your digital business /
Published 2015Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
-
10
Intrusion prevention and active response deploying network and host IPS /
Published 2005Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
-
12
Implementing NAP and NAC security technologies the complete guide to network access control /
Published 2008Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
-
14
Security intelligence : a practitioner's guide to solving enterprise security challenges /
Published 2015Subjects: “…Electronic information resources Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
Published 2011Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Penetration tester's open source toolkit
Published 2006Subjects: “…Electronic information resources Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
Integrated security systems design concepts, specifications, and implementation /
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Role engineering for enterprise security management
Published 2008Table of Contents: “…The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Building DMZs for Enterprise networks
Published 2003Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20