Your search returned 9 results.

1.
Intrusion Prevention and Active Response : Deploying Network and Host IPS.

by Rash, Michael | Orebaugh, Angela | Clark, Graham.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland : William Andrew, 2005Copyright date: ©2005Online access: Click to View Availability: No items available :

2.
Role-Based Access Control.

by Ferraiolo, David | Kuhn, Richard | Chandramouli, Ramaswamy.

Edition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Norwood : Artech House, 2003Copyright date: ©2003Online access: Click to View Availability: No items available :

3.
Building DMZs for Enterprise Networks.

by Syngress Media, Inc. Staff | Shimonski, Robert | Schmied, Will.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Rockland, MA : William Andrew, 2003Copyright date: ©2003Online access: Click to View Availability: No items available :

4.
Role-Based Access Control.

by Ferraiolo, David F | Kuhn, D. Richard | Chandramouli, Ramaswamy.

Series: Artech House Computer Security SeriesEdition: 2nd ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Norwood : Artech House, 2007Copyright date: ©2007Online access: Click to View Availability: No items available :

5.
Role Engineering for Enterprise Security Management.

by Coyne, Edward J | Davis, John M.

Series: Information Security & PrivacyMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Norwood : Artech House, 2007Copyright date: ©2008Online access: Click to View Availability: No items available :

6.
Implementing NAP and NAC Security Technologies : The Complete Guide to Network Access Control.

by Hoffman, Daniel V | Hoffman, Daniel.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hoboken : Wiley, 2008Copyright date: ©2008Online access: Click to View Availability: No items available :

7.
Role Mining in Business : Taming Rose-Based Access Control Administration.

by Pietro, Roberto Di | Colantonio, Alessandro | Ocello, Alberto.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Singapore : World Scientific Publishing Co Pte Ltd, 2011Copyright date: ©2012Online access: Click to View Availability: No items available :

8.
OpenAM.

by Thangasamy, Indira.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Olton : Packt Publishing Ltd, 2011Copyright date: ©2011Online access: Click to View Availability: No items available :

9.
Beyond Cybersecurity : Protecting Your Digital Business.

by Kaplan, James M | Bailey, Tucker | O'Halloran, Derek | Marcus, Alan | Rezek, Chris | Bailey, Tucker.

Edition: 1st ed.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Somerset : John Wiley & Sons, Incorporated, 2015Copyright date: ©2015Online access: Click to View Availability: No items available :

Powered by Koha