Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Access control 38
- Computers
- Computer security 16
- Security measures 15
- Computer networks 14
- Internet 8
- Censorship 7
- Government policy 6
- Penetration testing (Computer security) 5
- Passwords 4
- Acces 3
- Censure 3
- Contrôle 3
- Cyberspace 3
- Data encryption (Computer science) 3
- Ordinateurs 3
- Politique gouvernementale 3
- Testing 3
- Zensur 3
- COMPUTERS 2
- Cyberespace 2
- Database security 2
- Firewalls (Computer security) 2
- Security 2
- 05.20 communication and society 1
- COMPUTERS / Database Management / Data Mining 1
- COMPUTERS / Security / General 1
- Censuur 1
- Computer Security 1
- Confidential communications 1
-
1
Access Controlled : The Shaping of Power, Rights, and Rule in Cyberspace /
Published 2010Table of Contents: “…Beyond denial : introducing next-generation information access controls / Ronald Deibert and Rafal Rohozinski -- Control and subversion in Russian cyberspace / Ronald Deibert and Rafal Rohozinski -- The EU data retention directive in an era of Internet surveillance / Hal Roberts and John Palfrey -- Barriers to cooperation : an analysis of the origins of international efforts to protect children online / Nart Villeneuve -- Intermediary censorship / Ethan Zuckerman -- Protecting privacy and expression online : can the Global Network Initiative embrace the character of the Net? …”
Full text available:
Electronic eBook -
2
Role-based access control
Published 2003Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Role-based access control
Published 2007Subjects: “…Computer networks Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
OpenAM written and tested with OpenAM Snapshot 9 : the single sign-on (SSO) tool for securing your web applications in a fast and easy way /
Published 2011Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Relation based access control /
Published 2010Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
OAuth 2.0 identity and access management patterns /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Security assessment case studies for implementing the NSA lAM /
Published 2004Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Perfect passwords selection, protection, authentication /
Published 2006Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Instant Metasploit starter
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
10
Instant Java password and authentication security /
Published 2013Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
11
Attribute-Based Encryption and Access Control
Published 2020Table of Contents: “…Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Authors -- Contributors -- Part I: Foundations of Attribute-Based Encryption for Attribute-Based Access Control -- Chapter 1: Foundations of Attribute-Based Encryption -- 1.1 Attribute-Based Access Control-An ABE Approach -- 1.1.1 Motivation of ABE-Based Attribute-Based Access Control -- 1.1.2 Potentials and Issues of ABAC -- 1.2 Mathematical Background -- 1.2.1 Group and Cyclic Group -- 1.2.2 Prime-Order Bilinear Pairing -- 1.2.3 Composite-Order Bilinear Pairing…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
12
Check Point NG next generation security administration /
Published 2002Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
13
Linux firewalls attack detection and response with iptables, psad, and fwsnort /
Published 2007Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
14
Metasploit penetration testing cookbook /
Published 2013Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
15
Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
Published 2014Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
16
Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professional...
Published 2015Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
17
User's guide to cryptography and standards
Published 2005Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
18
Access denied the practice and policy of global Internet filtering /
Published 2008Subjects: “…Computers Access control.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
19
Managing information security : a program for the electronic information age /
Published 1982Subjects: “…Computers Access control.…”
Book -
20