Limit Search Results
Author
Language
Format
25 Results Found Subscribe to search results
000000000000MAIN
Print
2. 
Cover image for The Intrusion detection networks : a key to collaborative security
3. 
Cover image for Role mining in business : taming role-based access control administration
4. 
Cover image for Managed code rootkits : hooking into runtime environments
7. 
Cover image for Oracle identity management : governance, risk, and compliance architecture
9. 
Cover image for Mechanics of user identification and authentication : fundamentals of identity management
12. 
Cover image for Privacy-respecting intrusion detection