Search Results - "access control"

Refine Results
  1. 101

    Access Contested : Security, Identity, and Resistance in Asian Cyberspace /

    Published 2012
    Subjects:
    Full text available:
    Electronic eBook
  2. 102

    Net Neutrality and the Battle for the Open Internet / by Kimball, Danny, 1983-

    Published 2022
    Subjects:
    Full text available:
    Electronic eBook
  3. 103

    Mobile computing / by Kamal, Raj, 1949-

    Published 2012
    Table of Contents: “…Mobile communications : an overview -- Mobile devices and systems -- GSM and other 2G architectures -- Wireless medium access control, CDMA, 3G and 4G communication -- Mobile IP network layer -- Mobile transport layer -- Databases and mobile computing -- Data dissemination and systems for broadcasting -- Data synchronization in mobile computing systems -- Mobile devices : application servers and management -- Mobile ad-hoc and wireless sensor networks -- Mobile wireless short-range networks and mobile internet -- Mobile application languages : XML, Java, J2ME, and JavaCard -- Mobile application development platforms.…”
    Book
  4. 104

    Handbook of loss prevention and crime prevention

    Published 2012
    Table of Contents: “…Fennelly -- Standards, regulations & guidelines : compliance and your security program, including global resources / Rick Draper -- Security operations, tools, and technology -- Access control, access badges & biometrics characteristic / Joseph Nelson.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 105

    Information assurance handbook : effective computer security and risk management strategies / by Schou, Corey

    Published 2015
    Table of Contents: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices.…”
    Book
  6. 106
  7. 107

    Investigating Female Children’s Rights to Family Property and Its Implication on Children’s Justice in Kisii County, Kenya by Mogute, Mary

    Published 2019
    “…This study sought to establish respondents’ perceptions on female children’s rights to access, control, inherit and own property and their implications on children’s justice in Kisii County-Kenya. …”
    Get full text
    Article
  8. 108

    Environmental Governance in Latin America

    Published 2016
    Get full text
    Electronic eBook
  9. 109

    SECURITY AND PRIVACY IN THE INTERNET OF THINGS

    Published 2020
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  10. 110
  11. 111

    Cloud computing security foundations and challenges /

    Published 2021
    Table of Contents: “…3.3.4.3 Hashing -- 3.3.5 Virtualization Security -- 3.4 Privacy and Security in Cloud Storage Services -- 3.4.1 Cloud Data Protection Models -- 3.4.2 Enforcing Access Control Policies in the Cloud -- 3.4.3 Other Possible Causes of Data Leakage in the Cloud -- 3.5 Privacy and Security in Multiclouds -- 3.5.1 Desired Security and Privacy Properties in Multiclouds -- 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds -- 3.6 Cloud Accountability -- 3.7 Summary -- References -- Chapter 4 Cloud Security, Privacy and Trust Baselines -- 4.1 Introduction -- 4.2 Understanding the Threats…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  12. 112
  13. 113

    Business data communications and networking / by FitzGerald, Jerry

    Published 2015
    Table of Contents: “…Machine generated contents note: Chapter 1 Introduction to Data Communications 1.1 Introduction 1.2 Data Communications Networks 1.3 Network Models 1.4 Network Standards 1.5 Future Trends 1.6 Implications for Management Chapter 2 Application Layer 2.1 Introduction 2.2 Application Architectures 2.3 World Wide Web 2.4 Electronic Mail 2.5 Other applications 2.6 Implications for Management Chapter 3 Physical Layer 3.1 Introduction 3.2 Circuits 3.3 Communication Media 3.4 Digital Transmission of Digital Data 3.5 Analog Transmission of Digital 3.6 Digital Transmission of Analog Data 3.7 Implications for Management Chapter 4 Data Link Layer 4.1 Introduction 4.2 Media Access Control 4.3 Error Control 4.4 Data Link Protocols 4.5 Transmission Efficiency 4.6 Implications for Management Chapter 5 Network and Transport Layers 5.1 Introduction 5.2 Transport and Network Layer Protocols 5.3 Transport Layer Functions 5.4 Addressing 5.5 Routing 5.6 TCP/IP Example 5.7 Implications for Management Chapter 6 Network Design 6.1 Introduction 6.2 Needs Analysis 6.3 Technology Design 6.4 Cost Assessment 6.5 Implications for Management Chapter 7 Wired and Wireless Local Area Networks 7.1 Introduction 7.2 LAN Components 7.3 Wired Ethernet 7.4 Wireless Ethernet 7.5 The Best Practice LAN Design 7.6 Improving LAN Performance 7.7 Implications for Management Chapter 8 Backbone Networks 8.1 Introduction 8.2 Switched Backbone 8.3 Routed Backbones 8.4 Virtual LANs 8.5 The Best Practice Backbone Design 8.6 Improving Backbone Performance 8.7 Implications for Management Chapter 9 Wide Area Networks 9.1 Introduction 9.2 Dedicated-Circuit Networks 9.3 Packet-Switched Networks 9.4 Virtual Private Networks 9.5 The Best Practice WAN Design 9.6 Improving WAN Performance 9.7 Implications for Management Chapter 10 The Internet 10.1 Introduction 10.2 How the Internet Works 10.3 Internet Access Technologies 10.4 The Future of the Internet 10.5 Implications for Management Chapter 11 Network Security 11.1 Introduction 11.2 Risk Assessment 11.3 Ensuring Business Continuity 11.4 Intrusion Prevention 11.5 Best Practice Recommendations 11.6 Implications for Management Chapter 12 Network Management 12.1 Introduction 12.2 Designing for Network Performance 12.3 Configuration Management 12.4 Performance and Fault Management 12.5 End User Support 12.6 Cost Management 12.7 Implications for Management .…”
    Cover image
    Book
  14. 114

    Enterprise level security 2 advanced topics in an uncertain world / by Foltz, Kevin E., Simpson, William Randolph, 1946-

    Published 2020
    Table of Contents: “…</p><p>4.5 Key and Credential Access Control.</p><p>4.6 Key and Credential Management.…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  15. 115

    Roadway safety : identifying needs and implementing countermeasures / by Chandler, Brian E.

    Published 2016
    Table of Contents: “…Intersections -- 5.1 Uncontrolled intersections -- 5.1.1 Sight distance improvements -- 5.1.2 Add traffic control -- 5.2 Two-way stop-controlled intersections -- 5.2.1 Stop condition conspicuity -- 5.2.2 Advanced warning -- 5.2.3 Traffic calming -- 5.2.4 Geometric design -- 5.2.5 Pavement treatments -- 5.2.6 Traffic signal to address unsignalized intersection crashes -- 5.3 Expressway intersections -- 5.3.1 Turn lane design -- 5.3.2 Alternative designs, access control -- 5.3.3 Grade separation -- 5.4 Signalized intersections -- 5.4.1 Traffic signal warrants -- 5.4.2 Traffic signal conspicuity -- 5.4.3 Wayfinding and lane placement -- 5.4.4 Signal timing -- 5.4.5 Left turns -- 5.4.6 Red light running countermeasures -- 5.4.7 Pedestrians at intersections -- 5.5 Alternative intersection solutions -- 5.5.1 Modern roundabout -- 5.5.2 Other intersections -- 5.6 Interchanges -- 5.6.1 Applicable intersection and roadway departure treatments -- 5.6.2 Additional low-cost treatments -- 5.6.3 Alternative interchange designs --…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook