Limit Search Results
Language
Format
Switch to list view
Switch to thumbnail view
19 Results Found Subscribe to search results
000000000000MAIN
Print
1. 
Cover image for Security mechanisms for computer networks
2. 
Cover image for The Intrusion detection networks : a key to collaborative security
3. 
Cover image for Role mining in business : taming role-based access control administration
4. 
Cover image for Access control, security, and trust : a logical approach
5. 
Cover image for Designing an IAM framework with Oracle identity and access management suite
7. 
Cover image for Role-based access control
8. 
Cover image for IT security governance guidebook with security program metrics on CD-ROM
9. 
Cover image for Integrated security systems design : concepts, specifications, and implementation
11. 
Cover image for Privacy-respecting intrusion detection
Go to:Search Results
|
Top of Page
|
Search Facets