To see the other types of publications on this topic, follow the link: Access control.

Books on the topic 'Access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jenny, Baxter, and Key Note Publications, eds. Access control. 7th ed. Hampton: Key Note, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Emily, Pattullo, and Key Note Publications, eds. Access control. 4th ed. Hampton: Key Note, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jane, Griffiths, and Key Note Publications, eds. Access control. 6th ed. Hampton: Key Note, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Hampton: Key Note, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Larson, Jessica Megan. Snowflake Access Control. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8038-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hoppenstand, Gregory S. Secure access control with high access precision. Monterey, California: Naval Postgraduate School, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. Adaptive Cryptographic Access Control. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boonkrong, Sirapat. Authentication and Access Control. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mike, Hunt, and Jordan& Sons Limited., eds. Britain's access control industry. London: Jordan, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

MSI Marketing Research for Industry Ltd. and Marketing Strategies for Industry (UK) Ltd., eds. Electronic access control: France. Chester: MSI Marketing Research for Industry Ltd, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Rui. Relation based access control. Heidelberg: AKA, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Geshan, Susan Carol. Signature verification for access control. Monterey, Calif: Naval Postgraduate School, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hugo, Cornwall, ed. The hacker's handbook III. London: Century, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

National Science Foundation (U.S.). Office of Advanced Scientific Computing, ed. Access to supercomputers. Washington, D.C: National Science Foundation, Office of Advanced Scientific Computing, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ernst & Young., ed. A Practical approach to logical access control. London: McGraw-Hill, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ferrari, Elena. Access Control in Data Management Systems. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-01836-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Hua, Jinli Cao, and Yanchun Zhang. Access Control Management in Cloud Environments. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-31729-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ansari, Nirwan, and Jingjing Zhang. Media Access Control and Resource Allocation. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3939-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pal, Shantanu. Internet of Things and Access Control. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64998-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

K, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bowers, Dan M. Access control and personal identification systems. Boston: Butterworths, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

1973-, Wu Hongyi, and Pan Yi 1960-, eds. Medium access control in wireless networks. New York: Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

K, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Rakha, Hesham. Access control design on highway interchanges. Charlottesville, Va: Virginia Transportation Research Council, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

K, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Access control. 5th ed. Hampton: Key Note, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Access control. Hampton: Key Note, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Access control. 3rd ed. Hampton: Key Note, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Norman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Access Control Systems. Boston: Kluwer Academic Publishers, 2006. http://dx.doi.org/10.1007/0-387-27716-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Electronic Access Control. Elsevier, 2012. http://dx.doi.org/10.1016/c2009-0-64053-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Electronic Access Control. Elsevier, 2017. http://dx.doi.org/10.1016/c2015-0-04450-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Cave. Control (Access Technology). Nelson Thornes Ltd, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Norman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Wood, Michael B. Computer Access Control. Blackwell Publishers, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Norman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Access Control Systems. MSI Marketing Research for Industry Ltd, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Norman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Electronic Access Control. Newnes, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Electronic Access Control. Elsevier Science & Technology Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Martin, Patrick, Selim G. Akl, and Anne V. D. M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Introduction to access control. Worcester: British Security Industry Association, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ferraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Larkin, T. K. Control: Access Not Authorized. Vega Press, LLC, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Adaptive Cryptographic Access Control. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Martin, Patrick, Selim G. Akl, and Anne V. D M. Kayem. Adaptive Cryptographic Access Control. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Martin, Patrick, Selim G. Akl, and Anne V. D M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Rhodes, Brian, and Ipvm. IPVM Access Control Guide. IPVM, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Bhong, Shashikant S., Parikshit N. Mahalle, and Gitanjali Rahul Shinde. Authorization and Access Control. Taylor & Francis Group, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography