Search Results for Computers -- Access control. - Narrowed by: Computer security.SirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dComputers$002b--$002bAccess$002bcontrol.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026dt$003dlist$0026ps$003d300?dt=list2025-12-12T22:20:29ZA multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:505542025-12-12T22:20:29Z2025-12-12T22:20:29Zby Mjølsnes, Stig F.<br/>Format: Books<br/>Publication Date 2012<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:546472025-12-12T22:20:29Z2025-12-12T22:20:29Zby Colantonio, Alessandro.<br/>Format: Books<br/>Publication Date 2012<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:521922025-12-12T22:20:29Z2025-12-12T22:20:29Zby Gibson, Darril.<br/>Format: Books<br/>Publication Date 2011<br/>Computer securityent://SD_ILS/0/SD_ILS:252292025-12-12T22:20:29Z2025-12-12T22:20:29Zby Carroll, John Millar.<br/>Format: Books<br/>Publication Date 1996<br/>