Books on the topic 'LI. Authentication, and access control'

To see the other types of publications on this topic, follow the link: LI. Authentication, and access control.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'LI. Authentication, and access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Boonkrong, Sirapat. Authentication and Access Control. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Sudbury, MA: Jones & Bartlett Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Library public access workstation authentication. Washington, D.C: Association of Research Libraries, Office of Leadership and Management Services, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

802.1X port-based authentication. Boca Raton: Auerbach, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Edwin Lyle. 802.1X Port-Based Authentication. London: Taylor and Francis, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Institute of Standards and Technology (U.S.) and RAND Homeland Security and Defense Center, eds. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Libicki, Martin C. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

E, Koontz John, Devaney Judith E. 1943-, National Institute of Standards and Technology (U.S.), and United States. Dept. of Energy, eds. An authentication framework for Web access to remote hosts. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

National Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Burnett, Mark. Perfect Passwords: Selection, Protection, Authentication. Massachusetts, USA: Syngress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

), National Institute of Standards and Technology (U S. Guideline for the use of advanced authentication technology alternatives. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Computer Systems Laborotory (U.S.), ed. Guideline for the use of advanced authentication technology alternatives. Gaithersburg, MD: Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Todorov, Dobromir. Mechanics of user identificatlion and authentication: Fundamentals of identity management. Boca Raton, Fl: Auerbach Pub, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Silke, Holtmanns, ed. Cellular authentication for mobile and Internet services. Chichester, West Sussex, U.K: Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

National Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. [Ft. George G. Meade, MD]: National Computer Security Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mechanics of User Identification and Authentication. London: Taylor and Francis, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Premdeep, Banga, and Carroll Brandon, eds. AAA identity management security. Indianapolis, Ind: Cisco Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Authentication systems for secure networks. Boston: Artech House, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Security controls for Sarbanes-Oxley section 404 IT compliance: Authorization, authentication, and access. Hoboken, NJ: Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

The federal role in electronic authentication: Hearing before the Subcommittee on Domestic and International Monetary Policy of the Committee on Banking and Financial Services, House of Representatives, One Hundred Fifth Congress, first session, July 9, 1997. Washington: U.S. G.P.O., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Alice, Baish Mary, American Association of Law Libraries. Access to Electronic Legal Information Committee., and American Association of Law Libraries. Washington Affairs Office., eds. State-by-state report on authentication of online legal resources. Chicago, Ill: American Association of Law Libraries, Access to Electronic Legal Information Committee and Washington Affairs Office, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Transparent user authentication: Biometrics, RFID and behavioural profiling. London: Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Guide to claims-based identity and access control: Authentication and authorization for services and the web. [Redmond, Wash.]: Microsoft Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

National Institute of Standards and Technology (U.S.), ed. Federal agency use of public key technology for digital signatures and authentication. Gaithersburg, Md: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

National Institute of Standards and Technology (U.S.), ed. Federal agency use of public key technology for digital signatures and authentication. Gaithersburg, Md: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lyons-Burke, Kathy. Federal agency use of public key technology for digital signatures and authentication. Gaithersburg, Md: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mechanics of user identification and authentication: Fundamentals of identity management. Boca Raton, FL: Auerbach Pub, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Joint, OECD-Private Sector Workshop on Electronic Authentication (1999 Stanford and Menlo Park Calif ). Joint OECD-Private Sector Workshop on Electronic Authentication: Stanford and Menlo Park, California 2-4 June 1999. Paris: OECD, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Joint OECD-Private Sector Workshop on Electronic Authentication (1999 Stanford, Calif. and Menlo Park Calif.). Joint OECD-Private Sector Workshop on Electronic Authentication: Stanford and Menlo Park, California 2-4 June 1999. Paris: OECD, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Erdenreich, Sebastian. Negative Indentifizierung anhand des Tippverhaltens bei Verwendung fester und freier Textbestandteile. Wiesbaden: Springer Vieweg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ed. Tibaisŭ injŭng kiban ŭi yubikʻwŏtʻŏsŭ hom netʻŭwŏkʻŭ poan kisul kaebal =: The development of security technology based on device authentication for ubiquitous home network. [Seoul]: Chisik Kyŏngjebu, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hai liang wang luo cun chu xi tong yuan li yu she ji. Wuhan: Hua zhong ke ji ta xue chu ban she, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Fa lü chu ban she. Fa gui chu ban fen she., ed. Zhonghua Renmin Gongheguo zheng fu xin xi gong kai tiao li zhu shi ben: Regulation on governmental information publicity. Beijing Shi: Fa lü chu ban she, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

1944-, Seberry Jennifer, Susilo Willy, and SpringerLink (Online service), eds. Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ṣumaydah, Aḥmad Rajab Sayyidو. al-Tanẓīm al-qānūnī lil-ḥaqq fī al-khuṣūṣīyah: Al-maskhan, al-ittiṣālāt al-khāṣṣah, al-bayānāt al-shakhṣīyah fī al-qānūn al-Faransī wa-al-Amrīkī wa-al-Miṣrī wafqan li-ākhar al-taʻdīlāt al-tashrīʻīyah. al-Qāhirah: Dār al-Nahḍah al-ʻArabīyah lil-Nashr wa-al-Tawzīʻ, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Suwaylim, Muḥammad ʻAlī. al-Maḥākim al-iqtiṣādīyah ʻabra al-wasāʼil al-iliktrūnīyah: Dirāsah taṭbīqīyah muqāranah fī ḍawʼ al-qānūn 146 li-sanat 2019 wa-aḥdath aḥkām Maḥkamat al-Naqḍ ʻan al-maḥākim al-iqtiṣādīyah. al-Qāhirah: Dār al-Nahḍah al-ʻArabīyah, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Office, General Accounting. Electronic government: Planned e-Authentication gateway faces formidable development challenges : report to the Committee on Government Reform and the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House of Representatives. Washington, D.C: U.S. General Accounting Office, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Access Control, Authentication, and Public Key Infrastructure. Jones & Bartlett Learning, LLC, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Access Control, Authentication, and Public Key Infrastructure. Jones & Bartlett Learning, LLC, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Bidgoli, Hossein. Authentication and Access Control EBook for Loyola University. Wiley & Sons, Incorporated, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Chapple, Mike, Tricia Ballad, Bill Ballad, and Erin Banks. Access Control, Authentication, and Public Key Infrastructure: Print Bundle. Jones & Bartlett Learning, LLC, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Boonkrong, Sirapat. Authentication and Access Control: Practical Cryptography Methods and Tools. Apress L. P., 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lennon, Brian. Passwords: Philology, Security, Authentication. Harvard University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Passwords: Philology, Security, Authentication. Belknap Press: An Imprint of Harvard University Press, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Brown, Edwin Lyle. 802. 1x Port-Based Authentication. Taylor & Francis Group, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Brown, Edwin Lyle. 802. 1X Port-Based Authentication. Auerbach Publishers, Incorporated, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Brown, Edwin Lyle. 802. 1x Port-Based Authentication. Taylor & Francis Group, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tung, Brian. Kerberos: A Network Authentication System. Addison-Wesley Professional, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Access Control, Authentication, and Public Key Infrastructure with Virtual Lab Access Print Bundle. Jones & Bartlett Learning, LLC, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Brown, Edwin Lyle. 802.1X Port-Based Authentication. AUERBACH, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography