Showing 1 - 20 results of 77 for search '"Access"', query time: 0.08s Refine Results
  1. 1

    Role-based access control by Ferraiolo, David

    Published 2003
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 2

    Role-based access control by Ferraiolo, David

    Published 2007
    Subjects: “…Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 3

    Role-based access control by Ferraiolo, David

    Published 2003
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 4

    Role-based access control by Ferraiolo, David

    Published 2007
    Subjects: “…Computer networks Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 5
  6. 6
  7. 7

    Relation based access control / by Zhang, Rui

    Published 2010
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8

    Relation based access control / by Zhang, Rui

    Published 2010
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9
  10. 10
  11. 11

    Security assessment case studies for implementing the NSA lAM / by Rogers, Russ

    Published 2004
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 12
  13. 13

    Instant Metasploit starter by Ranganath, Karthik

    Published 2013
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 14
  15. 15

    Instant Metasploit starter by Ranganath, Karthik

    Published 2013
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16
  17. 17

    Security assessment case studies for implementing the NSA lAM / by Rogers, Russ

    Published 2004
    Subjects: “…Computers Access control.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 18
  19. 19
  20. 20