Computers - Access control.
Overview
Works: | 38 works in 13 publications in 13 languages |
---|
Titles
Computer privacy annoyances :how to avoid the most annoying invasions of your personal and online privacy /
by:
(Language materials, printed)
Access deniedthe practice and policy of global Internet filtering /
by:
(Language materials, printed)
Privacy in location-based applicationsresearch issues and emerging trends /
by:
(Electronic resources)
Integrated security systems designconcepts, specifications, and implementation /
by:
(Electronic resources)
Fundamentals of cryptologya professional reference and interactive tutorial /
by:
(Electronic resources)
Progress in cryptology, AFRICACRYPT 2010Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010 : proceedings /
by:
(Electronic resources)
Transparent user authenticationbiometrics, RFID and behavioural profiling /
by:
(Electronic resources)
The basics of digital privacy :simple tools to protect your personal information and your identity online /
by:
(Language materials, printed)
Contemporary identity and access management architecturesemerging research and opportunities /
by:
(Electronic resources)
Network Performance and SecurityTesting and Analyzing Using Open Source and Low-Cost Tools /
by:
(Electronic resources)
The basics of digital privacysimple tools to protect your personal information and your identity online /
by:
(Electronic resources)
Securing the perimeterdeploying identity and access management with free open source software /
by:
(Electronic resources)
Developing applications with Azure Active Directoryprinciples of authentication and authorization for architects and developers /
by:
(Electronic resources)
Pro ASP.NET Core Identityunder the hood with authentication and authorization in ASP.NET Core 5 and 6 applications /
by:
(Electronic resources)
Access control models and architectures for iot and cyber physical systems
by:
(Electronic resources)
Show more
Fewer
Subjects