Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security
- Access control 23
- Computers 16
- Computer networks 11
- Security measures 10
- Data protection 4
- Electronic information resources 4
- Internet 4
- COMPUTERS / Security / General 3
- Data encryption (Computer science) 3
- Passwords 3
- Censorship 2
- Cyberspace 2
- Database security 2
- Government policy 2
- Privacy, Right of 2
- Acces 1
- COMPUTERS 1
- COMPUTERS / Computer Graphics / Game Programming & Design 1
- COMPUTERS / Cryptography 1
- COMPUTERS / Database Management / Data Mining 1
- COMPUTERS / Information Technology 1
- Censure 1
- Cloud computing 1
- Computer fraud 1
- Computer hackers 1
- Confidential communications 1
- Contrôle 1
- Cryptography 1
- Cyberespace 1
-
1
Role-based access control
Published 2003Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Role-based access control
Published 2007Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Relation based access control /
Published 2010Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
OAuth 2.0 identity and access management patterns /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Perfect passwords selection, protection, authentication /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Instant Java password and authentication security /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Attribute-Based Encryption and Access Control
Published 2020Table of Contents: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Authors -- Contributors -- Part I: Foundations of Attribute-Based Encryption for Attribute-Based Access Control -- Chapter 1: Foundations of Attribute-Based Encryption -- 1.1 Attribute-Based Access Control-An ABE Approach -- 1.1.1 Motivation of ABE-Based Attribute-Based Access Control -- 1.1.2 Potentials and Issues of ABAC -- 1.2 Mathematical Background -- 1.2.1 Group and Cyclic Group -- 1.2.2 Prime-Order Bilinear Pairing -- 1.2.3 Composite-Order Bilinear Pairing…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
8
Check Point NG next generation security administration /
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
User's guide to cryptography and standards
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
-
11
Intrusion prevention and active response deploying network and host IPS /
Published 2005Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
12
-
13
Security intelligence : a practitioner's guide to solving enterprise security challenges /
Published 2015Subjects: “…Electronic information resources Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
-
15
Penetration tester's open source toolkit
Published 2006Subjects: “…Electronic information resources Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
-
17
Managing risk and information security : protect to enable /
Published 2016Subjects: “…Electronic information resources Access control 927…”
Book -
18
Critical information infrastructure protection and the law an overview of key issues /
Published 2003Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Digital privacy in the marketplace : perspectives on the information exchange /
Published 2015Subjects: “…Internet Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
20