11 Results Found Subscribe to search results
00000000000IIE
Print
1. 
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computers -- Access control.
Available: Copies:
2. 
Cover image for Role mining in business : taming role-based access control administration
by 
Colantonio, Alessandro.
Format: 
Books
Publication Date 
2012
Excerpt: 
Computers -- Access control.
Available: Copies:
3. 
Cover image for The net delusion : how not to liberate the world
by 
Morozov, Evgeny.
Format: 
Books
Publication Date 
2011
Excerpt: 
Computers -- Access control.
Available: Copies:
4. 
Cover image for Managing risk in information systems
by 
Gibson, Darril.
Format: 
Books
Publication Date 
2011
Excerpt: 
Electronic information resources -- Access control.
Available: Copies:
5. 
Cover image for Windows server 2008 : networking and Network Access Protection (NAP)
by 
Davies, Joseph, 1962-
Format: 
Books
Publication Date 
2008
Excerpt: 
Computer networks -- Access control.
Available: Copies:
6. 
Cover image for Self-defending networks : the next generation of network security
by 
De Capite, Duane.
Format: 
Books
Publication Date 
2007 2006
Excerpt: 
Computer networks -- Access control.
Available: Copies:
7. 
Cover image for Coding and cryptography : international workshop, WCC 2005, Bergen, Norway, March 14-18, 2005 : revised selected papers
by 
International Workshop on Coding and Cryptography (2005 : Bergen, Norway)
Format: 
Books
Publication Date 
2006
Excerpt: 
Computers -- Access control -- Congresses.
Available: Copies:
8. 
Cover image for Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings
by 
ACISP 2006 (2006 : Melbourne, Vic.)
Format: 
Books
Publication Date 
2006
Excerpt: 
Computers -- Access control -- Congresses.
Available: Copies:
9. 
Cover image for The hacker's handbook : the strategy behind breaking into and defending Networks
by 
Young, Susan (Susan Elizabeth), 1968-
Format: 
Books
Publication Date 
2003
Excerpt: 
Computer networks -- Access control.
Available: Copies:
10. 
Cover image for An information security handbook
by 
Hunter, John M. D., 1940-
Format: 
Books
Publication Date 
2001
Excerpt: 
Computers -- Access control -- Handbooks, manuals, etc.
Available: Copies:
11. 
Cover image for Computer security
by 
Carroll, John Millar.
Format: 
Books
Publication Date 
1996
Excerpt: 
Computer security / Carroll, John Millar.
Available: Copies:
Limit Search Results
Access Level
Format
Material Type
Language
Shelf Location
Publication Date
Item Available
Advanced Search Location