Books on the topic 'Computer networks – Access control'

To see the other types of publications on this topic, follow the link: Computer networks – Access control.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer networks – Access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Ferraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1973-, Wu Hongyi, and Pan Yi 1960-, eds. Medium access control in wireless networks. New York: Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Ping. Distributed Medium Access Control in Wireless Networks. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Access control systems: Security, identity, management, and trust models. New York: Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Elli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kerberos: The Definitive Guide. Beijing: O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1961-, Hopkins Ronald D., and Tokere Wesley P, eds. Computer security: Intrusion, detection, and prevention. Hauppauge, NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cisco IOS access lists. Sebastopol, CA: O'Reilly & Associates, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Boston: Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

International Business Machines Corporation. International Technical Support Organization, ed. Certification Study Guide Series: IBM Tivoli Federated Identity Manager 6.1. Poughkeepsie, NY: IBM, International Technical Support Organization, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Raouf, Boutaba, ed. Intrusion detection networks: A key to collaborative security. Boca Raton, [Florida]: Taylor & Francis/CRC, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Paquet, Catherine. Building Cisco remote access networks. Indianapolis, IN: Cisco Press, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tony, Antony, ed. First mile access networks and enabling technologies. Indianapolis, IN: Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ferraiolo, David. Role-based access controls. Boston: Artech House, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Melanie, McMullen, ed. Network remote access and mobile computing: Implementing effective remote access to networks and e-mail. San Francisco: Miller Freeman Books, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Institute, American National Standards. IEEE standards for local and metropolitan area networks: Media access control (MAC) bridges. New York, NY: Institute of Electrical and Electronics Engineers, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Indianapolis, IN: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Hoffman, Daniel. Implementing NAP and NAC security technologies: The complete guide to network access control. Indianapolis, IN: Wiley Technology Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Tricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Sudbury, MA: Jones & Bartlett Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

802.1X port-based authentication. Boca Raton: Auerbach, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Brown, Edwin Lyle. 802.1X Port-Based Authentication. London: Taylor and Francis, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

How secure is your wireless network?: Safeguarding your Wi-Fi- LAN. Upper Saddle River, NJ: Prentice Hall PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Remote access networks: PSTN, ISDN, ADSL, Internet and wireless. New York: McGraw-Hill, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Trost, Ryan. Practical intrusion analysis: Prevention and detection for the twenty-first century. Upper Saddle River, NJ: Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Prowell, Stacy J. Seven deadliest network attacks. Burlington, MA: Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

RADIUS. Beijing: O'Reilly, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hassell, Jonathan. RADIUS. Sebastopol, Calif: O'Reilly, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Association for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. New York, N.Y: ACM, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Mechanics of User Identification and Authentication. London: Taylor and Francis, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Scott, Charlie. Snort for dummies. Hoboken, NJ: Wiley Pub., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Mechanics of user identification and authentication: Fundamentals of identity management. Boca Raton, FL: Auerbach Pub, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Scott, Charlie. Snort For Dummies. New York: John Wiley & Sons, Ltd., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

An Information Security Handbook (Computer Communications and Networks). Springer, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Network Access Control For Dummies. For Dummies, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ferraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control, Second Edition. 2nd ed. Artech House Publishers, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zhuang, Weihua, and Ping Wang. Distributed Medium Access Control in Wireless Networks. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ferraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Distributed Medium Access Control In Wireless Networks. Springer-Verlag New York Inc., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Network Access Control For Dummies®. New York: John Wiley & Sons, Ltd., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kizza, Joseph Migga. Guide to Computer Network Security. Springer, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Guide to computer network security. Springer, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Remote Access Networks and Services: The Internet Access Companion. John Wiley & Sons, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gumaste, Ashwin, and Tony Antony. First Mile Access Networks and Enabling Technologies. Pearson Education, Limited, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Benantar, Messaoud. Access Control Systems: Security, Identity Management and Trust Models. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Pietro, Roberto Di, Alessandro Colantonio, and Alberto Ocello. Role Mining in Business: Taming Role-Based Access Control Administration. World Scientific Publishing Co Pte Ltd, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kim, Byung-Seo. Link-adaptive access control protocols for high-speed wireless networks. 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

National Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography