Search Results - (computers OR computer) access control

Refine Results
  1. 1

    Computer security

    Published 1986
    Subjects: “…Computers Access control…”
  2. 2

    Computers under attack intruders, worms, and viruses by Denning, Peter J. 1942-

    Published 1990
    Subjects:
  3. 3

    Personal computer security by Tiley, W. Edward

    Published 1996
    Subjects:
  4. 4

    Computer security by Galley, Shari Mendelson

    Published 1987
    Subjects: “…Computers Access control…”
  5. 5

    Access control, security, and trust a logical approach by Chin, Shiu-Kai, Older, Susan Beth

    Published 2011
    Subjects: “…Computers Access control…”
  6. 6

    Access control and identity management by Chapple, Mike

    Published 2021
    Subjects: “…Computers Access control…”
  7. 7

    Computer security handbook strategies and techniques for preventing data loss or theft by Maulton, Rolf T.

    Published 1986
    Subjects: “…Computers Access control…”
  8. 8

    Remote access essentials by Robbins, Margaret

    Published 1996
    Subjects: “…Computers Access control…”
  9. 9

    Cryptology unlocked by Wobst, Reinhard, Shafir, Angelika

    Published 2007
    Subjects: “…Computers Access control…”
    Table of contents only
  10. 10

    Implementing NAP and NAC security technologies the complete guide to network access control by Hoffman, Daniel (Daniel V.) 1972-

    Published 2008
    Subjects:
  11. 11

    Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings by Jonker, Willem 1962-, Petkovic, Milan

    Published 2007
    Subjects: “…Computers Access control Congresses…”
  12. 12

    Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers by Biryukov, Alex

    Published 2007
    Subjects: “…Computers Access control Congresses…”
  13. 13
  14. 14

    Handbook of eID security : concepts, practical experiences, technologies by Fumy, Walter, Paeschke, Manfred

    Published 2011
    Subjects:
  15. 15
  16. 16

    Api authorization by integrating role-based access control in kubernetes by Mohd Asyraf Muizzuddin Yunos

    Subjects:
  17. 17

    Modern cryptography theory and practice by Mao, Wenbo

    Published 2004
    Subjects: “…Computers Access control…”
  18. 18

    Security information and event management (SIEM) implementation by Miller, David 1959 November 5-

    Published 2011
    Subjects:
    McGraw Hill
  19. 19

    Designing an IAM framework with Oracle identity and access management suite by Scheidel, Jeff

    Published 2010
    Subjects:
    McGraw Hill
  20. 20