Search Results - (computers OR computer) access control

Refine Results
  1. 1

    Computer security

    Published 1986
    Subjects: “…Computers Access control…”
  2. 2

    Computers under attack : intruders, worms, and viruses by Denning, Peter J. , 1942-

    Published 1990
    Subjects:
  3. 3

    Personal computer security by Tiley, W. Edward

    Published 1996
    Subjects:
  4. 4

    Computer security by Galley, Shari Mendelson

    Published 1987
    Subjects: “…Computers Access control…”
  5. 5

    Access control, security, and trust : a logical approach by Chin, Shiu-Kai, Older, Susan Beth

    Published 2011
    Subjects: “…Computers Access control…”
  6. 6

    Computer security handbook : strategies and techniques for preventing data loss or theft by Maulton, Rolf T.

    Published 1986
    Subjects: “…Computers Access control…”
  7. 7

    Cryptology unlocked by Wobst, Reinhard, Shafir, Angelika

    Published 2007
    Subjects: “…Computers Access control…”
    Table of contents only
  8. 8
  9. 9

    Secure data management : 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings by Jonker, Willem , 1962-, Petkovic, Milan

    Published 2007
    Subjects: “…Computers Access control Congresses…”
  10. 10

    Fast software encryption : 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 : revised selected papers by Biryukov, Alex

    Published 2007
    Subjects: “…Computers Access control Congresses…”
  11. 11
  12. 12

    Handbook of eID security : concepts, practical experiences, technologies by Fumy, Walter, Paeschke, Manfred

    Published 2011
    Subjects:
  13. 13
  14. 14

    Modern cryptography : theory and practice by Mao, Wenbo

    Published 2004
    Subjects: “…Computers Access control…”
  15. 15
  16. 16

    Designing an IAM framework with Oracle identity and access management suite [ by Scheidel, Jeff

    Published 2010
    Subjects:
    McGraw Hill
  17. 17
  18. 18

    Computer networks by Tanenbaum, Andrew S. , 1944-

    Published 2003
  19. 19

    Mobile computing by Kamal, Raj , 1949-

    Published 2012
    Table of Contents: “…GSM and other 2G architectures -- 4. Wireless medium access control, CDMA, 3G and 4G communication -- 5. …”
  20. 20

    Security metrics [ a beginner's guide by Wong, Caroline

    Published 2012
    Subjects:
    McGraw Hill