Computer networks - Access control.
Overview
| Works: | 7 works in 7 publications in 7 languages | |
|---|---|---|
Titles
Information flow based security control beyond RBAC = How to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC) /
by:
(Electronic resources)
Transparent user authentication = biometrics, RFID and behavioural profiling /
by:
(Electronic resources)
The hacker's handbook : = the strategy behind breaking into and defending networks /
by:
(Language materials, printed)
Subjects