Search Results - "access control"
Suggested Topics within your search.
Suggested Topics within your search.
- Access control 97
- Computers 38
- Computer networks 30
- Security measures 30
- Computer security 26
- Government information 15
- Internet 14
- Medical records 14
- Law and legislation 12
- Government policy 11
- Privacy, Right of 11
- Freedom of information 10
- Data protection 9
- Censorship 8
- Public records 8
- Research 8
- Confidential communications 5
- Data processing 5
- Electronic information resources 5
- Information services 5
- Management 5
- Medical informatics 5
- Moral and ethical aspects 5
- Penetration testing (Computer security) 5
- Transparency in government 5
- Acces 4
- COMPUTERS / Security / General 4
- Contrôle 4
- Data encryption (Computer science) 4
- Information technology 4
-
101
Access Contested : Security, Identity, and Resistance in Asian Cyberspace /
Published 2012Subjects: Full text available:
Electronic eBook -
102
Net Neutrality and the Battle for the Open Internet /
Published 2022Subjects: Full text available:
Electronic eBook -
103
Mobile computing /
Published 2012Table of Contents: “…Mobile communications : an overview -- Mobile devices and systems -- GSM and other 2G architectures -- Wireless medium access control, CDMA, 3G and 4G communication -- Mobile IP network layer -- Mobile transport layer -- Databases and mobile computing -- Data dissemination and systems for broadcasting -- Data synchronization in mobile computing systems -- Mobile devices : application servers and management -- Mobile ad-hoc and wireless sensor networks -- Mobile wireless short-range networks and mobile internet -- Mobile application languages : XML, Java, J2ME, and JavaCard -- Mobile application development platforms.…”
Book -
104
Handbook of loss prevention and crime prevention
Published 2012Table of Contents: “…Fennelly -- Standards, regulations & guidelines : compliance and your security program, including global resources / Rick Draper -- Security operations, tools, and technology -- Access control, access badges & biometrics characteristic / Joseph Nelson.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
105
Information assurance handbook : effective computer security and risk management strategies /
Published 2015Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
Book -
106
-
107
Investigating Female Children’s Rights to Family Property and Its Implication on Children’s Justice in Kisii County, Kenya
Published 2019“…This study sought to establish respondents’ perceptions on female children’s rights to access, control, inherit and own property and their implications on children’s justice in Kisii County-Kenya. …”
Get full text
Article -
108
-
109
SECURITY AND PRIVACY IN THE INTERNET OF THINGS
Published 2020Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
110
-
111
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…3.3.4.3 Hashing -- 3.3.5 Virtualization Security -- 3.4 Privacy and Security in Cloud Storage Services -- 3.4.1 Cloud Data Protection Models -- 3.4.2 Enforcing Access Control Policies in the Cloud -- 3.4.3 Other Possible Causes of Data Leakage in the Cloud -- 3.5 Privacy and Security in Multiclouds -- 3.5.1 Desired Security and Privacy Properties in Multiclouds -- 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds -- 3.6 Cloud Accountability -- 3.7 Summary -- References -- Chapter 4 Cloud Security, Privacy and Trust Baselines -- 4.1 Introduction -- 4.2 Understanding the Threats…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
112
-
113
Business data communications and networking /
Published 2015Table of Contents: “…Machine generated contents note: Chapter 1 Introduction to Data Communications 1.1 Introduction 1.2 Data Communications Networks 1.3 Network Models 1.4 Network Standards 1.5 Future Trends 1.6 Implications for Management Chapter 2 Application Layer 2.1 Introduction 2.2 Application Architectures 2.3 World Wide Web 2.4 Electronic Mail 2.5 Other applications 2.6 Implications for Management Chapter 3 Physical Layer 3.1 Introduction 3.2 Circuits 3.3 Communication Media 3.4 Digital Transmission of Digital Data 3.5 Analog Transmission of Digital 3.6 Digital Transmission of Analog Data 3.7 Implications for Management Chapter 4 Data Link Layer 4.1 Introduction 4.2 Media Access Control 4.3 Error Control 4.4 Data Link Protocols 4.5 Transmission Efficiency 4.6 Implications for Management Chapter 5 Network and Transport Layers 5.1 Introduction 5.2 Transport and Network Layer Protocols 5.3 Transport Layer Functions 5.4 Addressing 5.5 Routing 5.6 TCP/IP Example 5.7 Implications for Management Chapter 6 Network Design 6.1 Introduction 6.2 Needs Analysis 6.3 Technology Design 6.4 Cost Assessment 6.5 Implications for Management Chapter 7 Wired and Wireless Local Area Networks 7.1 Introduction 7.2 LAN Components 7.3 Wired Ethernet 7.4 Wireless Ethernet 7.5 The Best Practice LAN Design 7.6 Improving LAN Performance 7.7 Implications for Management Chapter 8 Backbone Networks 8.1 Introduction 8.2 Switched Backbone 8.3 Routed Backbones 8.4 Virtual LANs 8.5 The Best Practice Backbone Design 8.6 Improving Backbone Performance 8.7 Implications for Management Chapter 9 Wide Area Networks 9.1 Introduction 9.2 Dedicated-Circuit Networks 9.3 Packet-Switched Networks 9.4 Virtual Private Networks 9.5 The Best Practice WAN Design 9.6 Improving WAN Performance 9.7 Implications for Management Chapter 10 The Internet 10.1 Introduction 10.2 How the Internet Works 10.3 Internet Access Technologies 10.4 The Future of the Internet 10.5 Implications for Management Chapter 11 Network Security 11.1 Introduction 11.2 Risk Assessment 11.3 Ensuring Business Continuity 11.4 Intrusion Prevention 11.5 Best Practice Recommendations 11.6 Implications for Management Chapter 12 Network Management 12.1 Introduction 12.2 Designing for Network Performance 12.3 Configuration Management 12.4 Performance and Fault Management 12.5 End User Support 12.6 Cost Management 12.7 Implications for Management .…”
Cover image
Book -
114
Enterprise level security 2 advanced topics in an uncertain world /
Published 2020Table of Contents: “…</p><p>4.5 Key and Credential Access Control.</p><p>4.6 Key and Credential Management.…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
115
Roadway safety : identifying needs and implementing countermeasures /
Published 2016Table of Contents: “…Intersections -- 5.1 Uncontrolled intersections -- 5.1.1 Sight distance improvements -- 5.1.2 Add traffic control -- 5.2 Two-way stop-controlled intersections -- 5.2.1 Stop condition conspicuity -- 5.2.2 Advanced warning -- 5.2.3 Traffic calming -- 5.2.4 Geometric design -- 5.2.5 Pavement treatments -- 5.2.6 Traffic signal to address unsignalized intersection crashes -- 5.3 Expressway intersections -- 5.3.1 Turn lane design -- 5.3.2 Alternative designs, access control -- 5.3.3 Grade separation -- 5.4 Signalized intersections -- 5.4.1 Traffic signal warrants -- 5.4.2 Traffic signal conspicuity -- 5.4.3 Wayfinding and lane placement -- 5.4.4 Signal timing -- 5.4.5 Left turns -- 5.4.6 Red light running countermeasures -- 5.4.7 Pedestrians at intersections -- 5.5 Alternative intersection solutions -- 5.5.1 Modern roundabout -- 5.5.2 Other intersections -- 5.6 Interchanges -- 5.6.1 Applicable intersection and roadway departure treatments -- 5.6.2 Additional low-cost treatments -- 5.6.3 Alternative interchange designs --…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook