Книги з теми "Time based access control"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 книг для дослідження на тему "Time based access control".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте книги для різних дисциплін та оформлюйте правильно вашу бібліографію.
Zhang, Rui. Relation based access control. Heidelberg: AKA, 2010.
Знайти повний текст джерелаFerraiolo, David. Role-based access control. 2nd ed. Boston: Artech House, 2007.
Знайти повний текст джерелаFerraiolo, David. Role-based access controls. Boston: Artech House, 2003.
Знайти повний текст джерелаYuen, Clement. Rate control with pricing in contention-based access networks. Ottawa: National Library of Canada, 2002.
Знайти повний текст джерелаKogan, Konstantin, and Eugene Khmelnitsky. Scheduling: Control-Based Theory and Polynomial-Time Algorithms. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-1-4615-4675-7.
Повний текст джерелаKogan, Konstantin. Scheduling: Control-based theory and polynomial-time algorithms. Dordrecht: Kluwer Academic Publishers, 2000.
Знайти повний текст джерелаHendrick, Thomas E. Purchasing's contributions to time-based strategies. Tempe, Ariz: Center for Advanced Purchasing Studies, 1994.
Знайти повний текст джерелаLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Знайти повний текст джерелаLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Знайти повний текст джерелаLarson, Richard R. A rule-based system for real-time analysis of control systems. Edwards, Calif: National Aeronautics and Space Administration, Ames Research Center, Dryden Flight Research Facility, 1992.
Знайти повний текст джерелаMehta, Axaykumar, and Bijnan Bandyopadhyay. Frequency-Shaped and Observer-Based Discrete-time Sliding Mode Control. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2238-5.
Повний текст джерелаL, Wilson C. Simple test procedure for image-based biometric verification systems. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Знайти повний текст джерелаControl system design based on exact model matching techniques. Berlin: Springer-Verlag, 1985.
Знайти повний текст джерелаCredeur, Leonard. Simulation evaluation of TIMER, a time-based terminal air traffic, flow-management concept. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1989.
Знайти повний текст джерела802.1X port-based authentication. Boca Raton: Auerbach, 2007.
Знайти повний текст джерелаBrown, Edwin Lyle. 802.1X Port-Based Authentication. London: Taylor and Francis, 2006.
Знайти повний текст джерелаSun, Qi-zhi. Knowledge-based interactive real-time control system in product-focused manufacturing environment. Portsmouth: Portsmouth Polytechnic, Business School, 1991.
Знайти повний текст джерелаKang, Shu Gang, and Shiu Hong Choi. Multi-Agent Based Beam Search for Real-Time Production Scheduling and Control. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4576-9.
Повний текст джерелаKnox, Charles E. Ground-based time-guidance algorithm for control of airplanes in a time-metered air traffic control environment: A piloted simulation study. Hampton, Va: Langley Research Center, 1986.
Знайти повний текст джерелаMichiels, W. Stability and stabilization of time-delay systems: An Eigenvalue-based approach. Philadelphia: Society for Industrial and Applied Mathematics, 2007.
Знайти повний текст джерелаAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control. and Technische Universität Berlin, eds. Proceedings, Fifth ACM Workshop on Role-Based Access Control: Berlin, Germany, July 26-27, 2000. New York, N.Y: ACM, 2000.
Знайти повний текст джерелаWilliams, David H. Airborne four-dimensional flight management in a time-based air traffic control environment. Hampton, Va: Langley Research Center, 1991.
Знайти повний текст джерелаHo, Tan-Jan. The control of real-time discrete-event systems subject to predicate-based constraints. Ottawa: National Library of Canada = Bibliothèque nationale du Canada, 1997.
Знайти повний текст джерелаWilliams, David H. Airborne four-dimensional flight management in a time-based air traffic control environment. [Washington, D.C.]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Division, 1991.
Знайти повний текст джерелаCredeur, Leonard. Final-approach spacing aids (FASA) evaluation for terminal-area, time-based air traffic control. Hampton, Va: Langley Research Center, 1993.
Знайти повний текст джерелаACM, Workshop on Role-Based Access Control (3rd 1998 Fairfax Va ). Proceedings: Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 22-23, 1998. New York, N.Y: ACM, 1998.
Знайти повний текст джерелаAssociation for Computing Machinery. Special Interest Group on Security, Audit, and Control., Association for Computing Machinery. Washington, D.C. Chapter., National Institute of Standards and Technology (U.S.), and George Mason University, eds. Proceedings, Fourth ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, October 28-29, 1999. New York, N.Y: ACM, 1999.
Знайти повний текст джерелаACM Workshop on Role-Based Access Control (4th 1999 Fairfax, Virginia, USA). Proceedings: Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 28-29, 1999. New York: Association for Computing Machinery, 1999.
Знайти повний текст джерелаACM, Workshop on Role-Based Access Control (2nd 1997 Fairfax Virginia). Proceedings Second ACM Workshop on Role-Based Access Control: Fairfax, Virginia, USA, November 6-7, 1997. New York: ACM, 1997.
Знайти повний текст джерелаGuide to claims-based identity and access control: Authentication and authorization for services and the web. [Redmond, Wash.]: Microsoft Press, 2010.
Знайти повний текст джерелаACM Workshop on Role-Based Access Control (2nd 1997 Fairfax, Va.). Proceedings: Second ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, November 6-7, 1997. New York: Association for Computing Machinery, 1997.
Знайти повний текст джерелаDas, Swagata, Devashree Tripathy, and Jagdish Lal Raheja. Real-Time BCI System Design to Control Arduino Based Speed Controllable Robot Using EEG. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-3098-8.
Повний текст джерелаACM Workshop on Role-Based Access Control (1st 1995 Gaithersburg, Md.). Proceedings--First ACM Workshop on Role-Based Access Control: Gaithersburg, Maryland, USA, 30 November - 1 December 1995. New York, N.Y: Association for Computing Machinery, 1995.
Знайти повний текст джерелаBranscomb, Anne W. Rogue computer program-- viruses, worms, Trojan horses, and time bombs: Prank, prowess, protection or prosecution? Cambridge, Mass: Program on Information Resources Policy, Harvard University, Center for Information Policy Research, 1989.
Знайти повний текст джерелаJoachim, Deutscher, ed. Design of observer-based compensators: From the time to the frequency domain. Dordrecht: Springer, 2009.
Знайти повний текст джерелаAttribute-Based Access Control. Artech House, 2017.
Знайти повний текст джерелаFerraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.
Знайти повний текст джерелаFerraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control, Second Edition. 2nd ed. Artech House Publishers, 2007.
Знайти повний текст джерелаAttribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Знайти повний текст джерелаYan, Zhu, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Знайти повний текст джерелаYan, Zhu, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Знайти повний текст джерелаZhu, Yan, Dijiang Huang, and Qiuxiang Dong. Attribute-Based Encryption and Access Control. Taylor & Francis Group, 2020.
Знайти повний текст джерелаElli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.
Знайти повний текст джерелаA revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Знайти повний текст джерелаNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Знайти повний текст джерелаElli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.
Знайти повний текст джерелаNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Знайти повний текст джерелаNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Знайти повний текст джерелаNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Знайти повний текст джерелаNational Institute of Standards and Technology (U.S.), ed. A revised model for role-based access control. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Знайти повний текст джерела