Libros sobre el tema "Access control"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Access control".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jenny, Baxter y Key Note Publications, eds. Access control. 7a ed. Hampton: Key Note, 2005.
Buscar texto completoEmily, Pattullo y Key Note Publications, eds. Access control. 4a ed. Hampton: Key Note, 2002.
Buscar texto completoJane, Griffiths y Key Note Publications, eds. Access control. 6a ed. Hampton: Key Note, 2004.
Buscar texto completoDominic, Fenn y Key Note Publications, eds. Access control. 2a ed. Hampton: Key Note, 1999.
Buscar texto completoLarson, Jessica Megan. Snowflake Access Control. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8038-6.
Texto completoFerraiolo, David. Role-based access control. 2a ed. Boston: Artech House, 2007.
Buscar texto completoHoppenstand, Gregory S. Secure access control with high access precision. Monterey, California: Naval Postgraduate School, 1988.
Buscar texto completoKayem, Anne V. D. M., Selim G. Akl y Patrick Martin. Adaptive Cryptographic Access Control. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1.
Texto completoBoonkrong, Sirapat. Authentication and Access Control. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Texto completoMike, Hunt y Jordan& Sons Limited., eds. Britain's access control industry. London: Jordan, 1988.
Buscar texto completoMSI Marketing Research for Industry Ltd. y Marketing Strategies for Industry (UK) Ltd., eds. Electronic access control: France. Chester: MSI Marketing Research for Industry Ltd, 1998.
Buscar texto completoZhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Buscar texto completoGeshan, Susan Carol. Signature verification for access control. Monterey, Calif: Naval Postgraduate School, 1991.
Buscar texto completoHugo, Cornwall, ed. The hacker's handbook III. London: Century, 1988.
Buscar texto completoNational Science Foundation (U.S.). Office of Advanced Scientific Computing, ed. Access to supercomputers. Washington, D.C: National Science Foundation, Office of Advanced Scientific Computing, 1985.
Buscar texto completoErnst & Young., ed. A Practical approach to logical access control. London: McGraw-Hill, 1993.
Buscar texto completoFerrari, Elena. Access Control in Data Management Systems. Cham: Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-01836-7.
Texto completoWang, Hua, Jinli Cao y Yanchun Zhang. Access Control Management in Cloud Environments. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-31729-4.
Texto completoAnsari, Nirwan y Jingjing Zhang. Media Access Control and Resource Allocation. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3939-4.
Texto completoPal, Shantanu. Internet of Things and Access Control. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64998-2.
Texto completoK, Thompson Alison y Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.
Buscar texto completoBowers, Dan M. Access control and personal identification systems. Boston: Butterworths, 1988.
Buscar texto completo1973-, Wu Hongyi y Pan Yi 1960-, eds. Medium access control in wireless networks. New York: Nova Science Publishers, 2008.
Buscar texto completoK, Thompson Alison y Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.
Buscar texto completoRakha, Hesham. Access control design on highway interchanges. Charlottesville, Va: Virginia Transportation Research Council, 2008.
Buscar texto completoK, Thompson Alison y Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. New York: Kluwer Academic/Plenum Publishers, 1999.
Buscar texto completoAccess control. 5a ed. Hampton: Key Note, 2003.
Buscar texto completoAccess control. Hampton: Key Note, 1998.
Buscar texto completoAccess control. 3a ed. Hampton: Key Note, 2001.
Buscar texto completoNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2011.
Buscar texto completoAccess Control Systems. Boston: Kluwer Academic Publishers, 2006. http://dx.doi.org/10.1007/0-387-27716-1.
Texto completoElectronic Access Control. Elsevier, 2012. http://dx.doi.org/10.1016/c2009-0-64053-8.
Texto completoElectronic Access Control. Elsevier, 2017. http://dx.doi.org/10.1016/c2015-0-04450-1.
Texto completoCave. Control (Access Technology). Nelson Thornes Ltd, 1996.
Buscar texto completoNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2011.
Buscar texto completoWood, Michael B. Computer Access Control. Blackwell Publishers, 1985.
Buscar texto completoNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2017.
Buscar texto completoAccess Control Systems. MSI Marketing Research for Industry Ltd, 2000.
Buscar texto completoNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2017.
Buscar texto completoElectronic Access Control. Newnes, 2000.
Buscar texto completoElectronic Access Control. Elsevier Science & Technology Books, 2000.
Buscar texto completoMartin, Patrick, Selim G. Akl y Anne V. D. M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.
Buscar texto completoIntroduction to access control. Worcester: British Security Industry Association, 1993.
Buscar texto completoFerraiolo, David F., D. Richard Kuhn y Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.
Buscar texto completoLarkin, T. K. Control: Access Not Authorized. Vega Press, LLC, 2023.
Buscar texto completoAdaptive Cryptographic Access Control. Springer, 2010.
Buscar texto completoMartin, Patrick, Selim G. Akl y Anne V. D M. Kayem. Adaptive Cryptographic Access Control. Springer, 2012.
Buscar texto completoMartin, Patrick, Selim G. Akl y Anne V. D M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.
Buscar texto completoRhodes, Brian y Ipvm. IPVM Access Control Guide. IPVM, 2021.
Buscar texto completoBhong, Shashikant S., Parikshit N. Mahalle y Gitanjali Rahul Shinde. Authorization and Access Control. Taylor & Francis Group, 2022.
Buscar texto completo