Libros sobre el tema "Access control"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Access control".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Jenny, Baxter, and Key Note Publications, eds. Access control. 7th ed. Key Note, 2005.
Buscar texto completoEmily, Pattullo, and Key Note Publications, eds. Access control. 4th ed. Key Note, 2002.
Buscar texto completoJane, Griffiths, and Key Note Publications, eds. Access control. 6th ed. Key Note, 2004.
Buscar texto completoDominic, Fenn, and Key Note Publications, eds. Access control. 2nd ed. Key Note, 1999.
Buscar texto completoLarson, Jessica Megan. Snowflake Access Control. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8038-6.
Texto completoHoppenstand, Gregory S. Secure access control with high access precision. Naval Postgraduate School, 1988.
Buscar texto completoKayem, Anne V. D. M., Selim G. Akl, and Patrick Martin. Adaptive Cryptographic Access Control. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-6655-1.
Texto completoBoonkrong, Sirapat. Authentication and Access Control. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.
Texto completoMike, Hunt, and Jordan& Sons Limited., eds. Britain's access control industry. Jordan, 1988.
Buscar texto completoMSI Marketing Research for Industry Ltd. and Marketing Strategies for Industry (UK) Ltd., eds. Electronic access control: France. MSI Marketing Research for Industry Ltd, 1998.
Buscar texto completoGeshan, Susan Carol. Signature verification for access control. Naval Postgraduate School, 1991.
Buscar texto completoNational Science Foundation (U.S.). Office of Advanced Scientific Computing, ed. Access to supercomputers. National Science Foundation, Office of Advanced Scientific Computing, 1985.
Buscar texto completoErnst & Young., ed. A Practical approach to logical access control. McGraw-Hill, 1993.
Buscar texto completoFerrari, Elena. Access Control in Data Management Systems. Springer International Publishing, 2010. http://dx.doi.org/10.1007/978-3-031-01836-7.
Texto completoWang, Hua, Jinli Cao, and Yanchun Zhang. Access Control Management in Cloud Environments. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-31729-4.
Texto completoAnsari, Nirwan, and Jingjing Zhang. Media Access Control and Resource Allocation. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-3939-4.
Texto completoPal, Shantanu. Internet of Things and Access Control. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64998-2.
Texto completoK, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. Kluwer Academic/Plenum Publishers, 1999.
Buscar texto completoBowers, Dan M. Access control and personal identification systems. Butterworths, 1988.
Buscar texto completo1973-, Wu Hongyi, and Pan Yi 1960-, eds. Medium access control in wireless networks. Nova Science Publishers, 2008.
Buscar texto completoK, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. Kluwer Academic/Plenum Publishers, 1999.
Buscar texto completoRakha, Hesham. Access control design on highway interchanges. Virginia Transportation Research Council, 2008.
Buscar texto completoK, Thompson Alison, and Chadwick Ruth F, eds. Genetic information: Acquisition, access, and control. Kluwer Academic/Plenum Publishers, 1999.
Buscar texto completoNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2011.
Buscar texto completoAccess Control Systems. Kluwer Academic Publishers, 2006. http://dx.doi.org/10.1007/0-387-27716-1.
Texto completoElectronic Access Control. Elsevier, 2012. http://dx.doi.org/10.1016/c2009-0-64053-8.
Texto completoElectronic Access Control. Elsevier, 2017. http://dx.doi.org/10.1016/c2015-0-04450-1.
Texto completoNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2011.
Buscar texto completoNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2017.
Buscar texto completoNorman, Thomas L. Electronic Access Control. Elsevier Science & Technology Books, 2017.
Buscar texto completoMartin, Patrick, Selim G. Akl, and Anne V. D. M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.
Buscar texto completoIntroduction to access control. British Security Industry Association, 1993.
Buscar texto completoFerraiolo, David F., D. Richard Kuhn, and Ramaswamy Chandramouli. Role-Based Access Control. Artech House Publishers, 2003.
Buscar texto completoMartin, Patrick, Selim G. Akl, and Anne V. D M. Kayem. Adaptive Cryptographic Access Control. Springer, 2012.
Buscar texto completoMartin, Patrick, Selim G. Akl, and Anne V. D M. Kayem. Adaptive Cryptographic Access Control. Springer, 2010.
Buscar texto completoBhong, Shashikant S., Parikshit N. Mahalle, and Gitanjali Rahul Shinde. Authorization and Access Control. Taylor & Francis Group, 2022.
Buscar texto completo