Computer networks - Access control.
Overview
Works: | 37 works in 27 publications in 27 languages |
---|
Titles
Biometrics : = identity verification in a networked world : a Wiley tech brief /
by:
(Language materials, printed)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Digital identity and access management = technologies and frameworks /
by:
(Language materials, printed)
Information flow based security control beyond RBAC = How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
by:
(Electronic resources)
Architecting user-centric privacy-as-a-set-of-services = digital identity-related privacy framework /
by:
(Electronic resources)
Penetration testing basics = a quick-start guide to breaking into systems /
by:
(Electronic resources)
Transactions on computational science XXX = Special Issue on Cyberworlds and Cybersecurity /
by:
(Electronic resources)
Privileged attack vectors = building effective cyber-defense strategies to protect organizations /
by:
(Electronic resources)
Contemporary identity and access management architectures = emerging research and opportunities /
by:
(Electronic resources)
Visual privacy management = design and applications of a privacy-enabling platform /
by:
(Electronic resources)
Security and privacy for modern networks = strategies and insights for safeguarding digital infrastructures /
by:
(Electronic resources)
Show more
Fewer
Subjects