Computers - Access control.
Overview
Works: | 18 works in 9 publications in 9 languages |
---|
Titles
Integrated security systems design[electronic resource] :concepts, specifications, and implementation /
by:
(Language materials, printed)
The rootkit arsenal :escape and evasion in the dark corners of the system /
by:
(Language materials, printed)
Designing an IAM framework with Oracle identity and access management suite /
by:
(Language materials, printed)
Formal models and techniques for analyzing security protocols[electronic resource] /
by:
(Language materials, printed)
Privacy solutions and security frameworks in information protection[electronic resource] /
by:
(Language materials, printed)
Managed code rootkits[electronic resource] :hooking into runtime environments /
by:
(Language materials, printed)
Security for wireless sensor networks using identity-based cryptography[electronic resource] /
by:
(Language materials, printed)
Innovative solutions for access control management[electronic resource] /
by:
(Language materials, printed)
Role mining in business[electronic resource] :taming role-based access control administration /
by:
(Electronic resources)
Contemporary identity and access management architectures[electronic resource] :emerging research and opportunities /
by:
(Electronic resources)
Network Performance and Security[electronic resource] :Testing and Analyzing Using Open Source and Low-Cost Tools /
by:
(Language materials, printed)
The basics of digital privacy[electronic resource] :simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
Foundations of information security based on ISO 27001 and ISO 27002 /
by:
(Language materials, printed)
Subjects