Limit Search Results
Author
Language
Subject
314 Results Found Subscribe to search results
000000000000MAIN
Print
49. 
Cover image for Role mining in business : taming role-based access control administration
50. 
Cover image for Security information and event management (SIEM) implementation
51. 
Cover image for Access control, security, and trust : a logical approach
53. 
Cover image for Managed code rootkits : hooking into runtime environments
56. 
Cover image for Designing an IAM framework with Oracle identity and access management suite
57. 
Cover image for Seven deadliest network attacks