Innovative solutions for access control management
This book features a comprehensive discussion on the trending topics and emergent research in IT security and governance, highlighting theoretical frameworks and best practices, as well as challenges and solutions within the topic of access control and management
Saved in:
| Other Authors: | Malik, Ahmad Kamran 1973- (Editor), Anjum, Adeel 1982- (Editor), Raza, Basit, 1976- (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
[2016]
|
| Series: | Advances in information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.9.D314 I566 2016 |
Similar Items
Digital identity management
Published: (2015)
Published: (2015)
Identity and access management business performance through connected intelligence
by: Osmanoglu, Ertem
Published: (2013)
by: Osmanoglu, Ertem
Published: (2013)
Kali Linux cookbook effective penetration testing solutions
by: Schultz, Corey P., et al.
Published: (2017)
by: Schultz, Corey P., et al.
Published: (2017)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
Metasploit bootcamp a fast-paced guide to enhance your pentesting skills
by: Jaswal, Nipun
Published: (2017)
by: Jaswal, Nipun
Published: (2017)
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
Microsoft access 2000
by: Laudon
Published: (2000)
by: Laudon
Published: (2000)
Access 2000 simplified
by: Palani Murugappan
Published: (2000)
by: Palani Murugappan
Published: (2000)
Access 2007 for starters the missing manual / by Matthew MacDonald
by: MacDonald, Matthew
Published: (2007)
by: MacDonald, Matthew
Published: (2007)
Practical Microsoft Access
by: Apps, Tim
Published: (1996)
by: Apps, Tim
Published: (1996)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
The antivirus hacker's handbook
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
Microsoft office access 2003
by: Coulthard, Glen J., et al.
Published: (2003)
by: Coulthard, Glen J., et al.
Published: (2003)
Successful I.T. projects in Access
by: Heathcote, P. M.
Published: (1999)
by: Heathcote, P. M.
Published: (1999)
Essentials Access 2000 basic
by: Ferrett, Robert, et al.
Published: (2000)
by: Ferrett, Robert, et al.
Published: (2000)
Microsoft access 97 Illustrated standard edition
by: Reding
Published: (1997)
by: Reding
Published: (1997)
Microsoft Access 2000 langkah demi langkah
by: Palani Murugappan
Published: (2000)
by: Palani Murugappan
Published: (2000)
The unofficial guide to Microsoft Office Access 2007
by: Keogh, Jim
Published: (2007)
by: Keogh, Jim
Published: (2007)
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
Information protection playbook
Published: (2013)
Published: (2013)
Computer and communication security strategies for the 1990s
by: Cooper
Published: (1989)
by: Cooper
Published: (1989)
Microsoft access 2000 step by step
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
New perspectives on Microsoft Access 97 comprehensive
by: Adamski, Joseph J. 1945-, et al.
Published: (1998)
by: Adamski, Joseph J. 1945-, et al.
Published: (1998)
Learn access 2000
by: Preston, John, et al.
Published: (2000)
by: Preston, John, et al.
Published: (2000)
New perspectives on microsoft Access 07 introductory
by: Adamski
Published: (1997)
by: Adamski
Published: (1997)
Understanding & using microsof access 97
by: McLaren
Published: (1998)
by: McLaren
Published: (1998)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
Microsoft Access 97 exam prep
by: Reding
Published: (1998)
by: Reding
Published: (1998)
Microsoft Office Access 2003 comprehensive concepts and techniques
by: Shelly
Published: (2004)
by: Shelly
Published: (2004)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
Computer and intrusion forensics
Published: (2003)
Published: (2003)
Computer security a comprehensive controls checklist
by: lh
Published: (1987)
by: lh
Published: (1987)
Similar Items
-
Digital identity management
Published: (2015) -
Identity and access management business performance through connected intelligence
by: Osmanoglu, Ertem
Published: (2013) -
Kali Linux cookbook effective penetration testing solutions
by: Schultz, Corey P., et al.
Published: (2017) -
Security in computing
by: Pfleeger lhCharles P. -
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)


