Computers - Access control.
Overview
Works: | 29 works in 14 publications in 14 languages |
---|
Titles
Cryptography and security services = mechanisms and applications /
by:
(Language materials, printed)
Access denied = the practice and policy of global Internet filtering /
by:
(Language materials, printed)
Transparent user authentication = biometrics, RFID and behavioural profiling /
by:
(Language materials, printed)
Composition of secure multi-party protocols = a comprehensive study /
by:
(Language materials, printed)
Privacy solutions and security frameworks in information protection
by:
(Language materials, printed)
Intrusion prevention and active response = deploying network and host IPS /
by:
(Language materials, printed)
The basics of digital privacy = simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
Integrated security systems design = a complete reference for building enterprise-wide digital security systems /
by:
(Language materials, printed)
Security for wireless sensor networks using identity-based cryptography
by:
(Language materials, printed)
Role mining in business = taming role-based access control administration /
by:
(Language materials, printed)
Contemporary identity and access management architectures = emerging research and opportunities /
by:
(Language materials, printed)
Network Performance and Security = Testing and Analyzing Using Open Source and Low-Cost Tools /
by:
(Language materials, printed)
The basics of digital privacy = simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
Securing the perimeter = deploying identity and access management with free open source software /
by:
(Language materials, printed)
Show more
Fewer
Subjects