Access control and identity management
| Main Author: | Chapple, Mike (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Burlington, Massachusetts
Jones & Bartlett Learning
c2021
|
| Edition: | Third edition |
| Subjects: |
Similar Items
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Api authorization by integrating role-based access control in kubernetes
by: Mohd Asyraf Muizzuddin Yunos
by: Mohd Asyraf Muizzuddin Yunos
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Introduction to cryptography and network security
by: Forouzan, Behrouz A.
Published: (2008)
by: Forouzan, Behrouz A.
Published: (2008)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
Computer security
Published: (1986)
Published: (1986)
Internet governance and censorship
by: Fuentes, Osbaldo, et al.
Published: (2014)
by: Fuentes, Osbaldo, et al.
Published: (2014)
World Wide Web, web accessibility and services
by: Lavigne, Lourdes
Published: (2014)
by: Lavigne, Lourdes
Published: (2014)
Designing an IAM framework with Oracle identity and access management suite
by: Scheidel, Jeff
Published: (2010)
by: Scheidel, Jeff
Published: (2010)
Collaborative computer security and trust management
by: Seigneur, Jean-Marc, et al.
Published: (2010)
by: Seigneur, Jean-Marc, et al.
Published: (2010)
Open access what you need to know now
by: Crawford, Walt
Published: (2011)
by: Crawford, Walt
Published: (2011)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Citrix XenApp platinum edition for Windows the official guide
by: Casselman, Brian, et al.
Published: (2009)
by: Casselman, Brian, et al.
Published: (2009)
Access 2007 bible
by: Groh, Michael R. 1951-
Published: (2007)
by: Groh, Michael R. 1951-
Published: (2007)
Creating Access applications
by: Dunn, Melissa W.
Published: (1994)
by: Dunn, Melissa W.
Published: (1994)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Internet and Intranet security
by: Oppliger, Rolf
Published: (2002)
by: Oppliger, Rolf
Published: (2002)
Access 2000 through examples
by: Sellappan, P.
Published: (1999)
by: Sellappan, P.
Published: (1999)
Access 97 power programming
by: Barker, F. Scott
Published: (1997)
by: Barker, F. Scott
Published: (1997)
Access 97 developer's handbook
by: Litwin, Paul, et al.
Published: (1997)
by: Litwin, Paul, et al.
Published: (1997)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Wiley survival guide in global telecommunications broadband access, optical components, and networks, and cryptography
by: Desurvire, Emmanuel 1955-
Published: (2004)
by: Desurvire, Emmanuel 1955-
Published: (2004)
Access 2000 client/server solutions
by: Klander, Lars
Published: (2000)
by: Klander, Lars
Published: (2000)
نظرية التشفير والتعمية الاساسيات
by: Hankerson, Darrel R.
Published: (2014)
by: Hankerson, Darrel R.
Published: (2014)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Microsoft access 2007 data analysis
by: Alexander, Michael 1972-
Published: (2007)
by: Alexander, Michael 1972-
Published: (2007)
Go! with Microsoft Office Access 2003 comprehensive
by: Foster-Turpen, Linda, et al.
Published: (2004)
by: Foster-Turpen, Linda, et al.
Published: (2004)
Building accounting systems using Access 2007
by: Perry, James T., et al.
Published: (2010)
by: Perry, James T., et al.
Published: (2010)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Instant Internet access
by: Jamsa, Kris A.
Published: (1994)
by: Jamsa, Kris A.
Published: (1994)
Internet access essentials
by: Tittel, Ed, et al.
Published: (1995)
by: Tittel, Ed, et al.
Published: (1995)
Similar Items
-
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007) -
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011) -
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007) -
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004) -
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)