Books on the topic 'And access control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'And access control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Emily, Pattullo, and Key Note Publications, eds. Access control. 4th ed. Hampton: Key Note, 2002.
Find full textJane, Griffiths, and Key Note Publications, eds. Access control. 6th ed. Hampton: Key Note, 2004.
Find full textDominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Hampton: Key Note, 1999.
Find full textJenny, Baxter, and Key Note Publications, eds. Access control. 7th ed. Hampton: Key Note, 2005.
Find full textLarson, Jessica Megan. Snowflake Access Control. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8038-6.
Full textHugo, Cornwall, ed. Hugo Cornwall's new hacker's handbook. 4th ed. London: Century, 1989.
Find full textFerraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Find full textHoppenstand, Gregory S. Secure access control with high access precision. Monterey, California: Naval Postgraduate School, 1988.
Find full textKayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. Adaptive Cryptographic Access Control. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1.
Full textBoonkrong, Sirapat. Authentication and Access Control. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Full textMike, Hunt, and Jordan& Sons Limited., eds. Britain's access control industry. London: Jordan, 1988.
Find full textMSI Marketing Research for Industry Ltd. and Marketing Strategies for Industry (UK) Ltd., eds. Electronic access control: France. Chester: MSI Marketing Research for Industry Ltd, 1998.
Find full textZhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Find full textGeshan, Susan Carol. Signature verification for access control. Monterey, Calif: Naval Postgraduate School, 1991.
Find full textHugo, Cornwall, ed. The hacker's handbook III. London: Century, 1988.
Find full textEducation, American Council on, ed. Access to supercomputers. Washington, D.C: American Council on Education, 1986.
Find full textNational Science Foundation (U.S.). Office of Advanced Scientific Computing, ed. Access to supercomputers. Washington, D.C: National Science Foundation, Office of Advanced Scientific Computing, 1985.
Find full textErnst & Young., ed. A Practical approach to logical access control. London: McGraw-Hill, 1993.
Find full textFerrari, Elena. Access Control in Data Management Systems. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-01836-7.
Full textWang, Hua, Jinli Cao, and Yanchun Zhang. Access Control Management in Cloud Environments. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-31729-4.
Full textAnsari, Nirwan, and Jingjing Zhang. Media Access Control and Resource Allocation. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3939-4.
Full textPal, Shantanu. Internet of Things and Access Control. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64998-2.
Full textAccess control in data management systems. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool, 2010.
Find full textRakha, Hesham. Access control design on highway interchanges. Charlottesville, Va: Virginia Transportation Research Council, 2008.
Find full textK, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.
Find full textK, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.
Find full textBowers, Dan M. Access control and personal identification systems. Boston: Butterworths, 1988.
Find full text1973-, Wu Hongyi, and Pan Yi 1960-, eds. Medium access control in wireless networks. New York: Nova Science Publishers, 2008.
Find full textK, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.
Find full textAccess control. 5th ed. Hampton: Key Note, 2003.
Find full textAccess control. Hampton: Key Note, 1998.
Find full textAccess control. 3rd ed. Hampton: Key Note, 2001.
Find full textNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2011.
Find full textAccess Control Systems. Boston: Kluwer Academic Publishers, 2006. http://dx.doi.org/10.1007/0-387-27716-1.
Full textElectronic Access Control. Elsevier, 2012. http://dx.doi.org/10.1016/c2009-0-64053-8.
Full textElectronic Access Control. Elsevier, 2017. http://dx.doi.org/10.1016/c2015-0-04450-1.
Full textCave. Control (Access Technology). Nelson Thornes Ltd, 1996.
Find full textNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2011.
Find full textElectronic Access Control. Elsevier Science & Technology Books, 2000.
Find full textAccess Control Systems. MSI Marketing Research for Industry Ltd, 2000.
Find full textNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2017.
Find full textElectronic Access Control. Newnes, 2000.
Find full textWood, Michael B. Computer Access Control. Blackwell Publishers, 1985.
Find full textNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2017.
Find full textMartin, Patrick, Selim G. Akl, and Anne V. D. M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.
Find full textIntroduction to access control. Worcester: British Security Industry Association, 1993.
Find full textFerraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.
Find full textAdaptive Cryptographic Access Control. Springer, 2010.
Find full textMartin, Patrick, Selim G. Akl, and Anne V. D M. Kayem. Adaptive Cryptographic Access Control. Springer, 2012.
Find full textMartin, Patrick, Selim G. Akl, and Anne V. D M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.
Find full text