|
1.
|
|
|
2.
|
Role-Based Access Control. by Ferraiolo, David | Kuhn, Richard | Chandramouli, Ramaswamy. Edition: 2nd ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Norwood : Artech House, 2003Copyright date: ©2003Online access: Click to View Availability: No items available :
|
|
3.
|
Building DMZs for Enterprise Networks. by Syngress Media, Inc. Staff | Shimonski, Robert | Schmied, Will. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Rockland, MA : William Andrew, 2003Copyright date: ©2003Online access: Click to View Availability: No items available :
|
|
4.
|
|
|
5.
|
|
|
6.
|
|
|
7.
|
|
|
8.
|
OpenAM. by Thangasamy, Indira. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Olton : Packt Publishing Ltd, 2011Copyright date: ©2011Online access: Click to View Availability: No items available :
|
|
9.
|
Beyond Cybersecurity : Protecting Your Digital Business. by Kaplan, James M | Bailey, Tucker | O'Halloran, Derek | Marcus, Alan | Rezek, Chris | Bailey, Tucker. Edition: 1st ed.Material type: Text; Format:
available online
; Literary form:
Not fiction
Publisher: Somerset : John Wiley & Sons, Incorporated, 2015Copyright date: ©2015Online access: Click to View Availability: No items available :
|