Limit Search Results
Author
Language
Format
71 Results Found Subscribe to search results
000000000000MAIN
Print
15. 
Cover image for Role mining in business : taming role-based access control administration
21. 
Cover image for Managed code rootkits : hooking into runtime environments