Search Results for Computers -- Access control. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list2025-10-28T12:23:59ZRole mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:546472025-10-28T12:23:59Z2025-10-28T12:23:59Zby Colantonio, Alessandro.<br/>Format: Books<br/>Publication Date 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-10-28T12:23:59Z2025-10-28T12:23:59Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:521922025-10-28T12:23:59Z2025-10-28T12:23:59Zby Gibson, Darril.<br/>Format: Books<br/>Publication Date 2011<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-10-28T12:23:59Z2025-10-28T12:23:59Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>