Computers -- Access control
Resource Information
The concept Computers -- Access control represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
The Resource
Computers -- Access control
Resource Information
The concept Computers -- Access control represents the subject, aboutness, idea or notion of resources found in University of Missouri Libraries.
- Label
- Computers -- Access control
208 Items that share the Concept Computers -- Access control
Context
Context of Computers -- Access controlSubject of
No resources found
No enriched resources found
- A Guide to understanding discretionary access control in trusted systems
- A cryptosystem for one-to-multipoint communication
- A data base management approach to Privacy act compliance
- A guide to understanding trusted facility management
- A guide to writing the security features user's guide for trusted systems
- A multidisciplinary introduction to information security
- A new strong proactive verifiable secret sharing scheme with unconditional security
- A revised model for role-based access control
- A revised model for role-based access control
- AAA identity management security
- Access control, authentication, and public key infrastructure
- Access control, security, and trust : a logical approach
- Access controlled : the shaping of power, rights, and rule in cyberspace
- Access with trust
- Adaptive cryptographic access control
- Advances in computer system security
- Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings
- An analysis of computer safeguards for detecting and preventing intentional computer misuse
- An authentication framework for Web access to remote hosts
- Application security system : a design and implementation of relational database
- Assessing controlled access protection
- Audit and control of systems software
- Audit and evaluation of computer security : proceedings of the NBS invitational workshop held at Miami Beach, Florida, March 22-24, 1977
- Auditing computer security : a manual with case studies
- Authentication systems for secure networks
- Automated systems security--Federal agencies should strengthen safeguards over personal and other sensitive data : report to the Congress
- Becoming the hacker : the playbook for getting inside the mind of an attacker
- Botnets and hackers and spam (oh, my!
- Building a pentesting lab for wireless networks : build your own secure enterprise or home penetration testing lab to dig into the various hacking techniques
- Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
- Cisco NAC appliance : enforcing host security with clean access
- Cisco Security Agent
- Cisco bring your own device (BYOD) networking
- Communications and computer surveillance, privacy, and security : hearing before the Subcommittee on Technology, Environment, and Aviation of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, May 3, 1994
- Composition of secure multi-party protocols : a comprehensive study
- Computer Matching Act, OMB and selected agencies need to ensure consistent implementation : report to congressional requesters
- Computer and communications security and privacy : hearings before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science and Technology, U.S. House of Representatives, Ninety-eighth Congress, first session, September 26 ; October 17, 24, 1983
- Computer auditing, security, and internal control manual
- Computer control and security : a guide for managers and systems analysts
- Computer crime and security
- Computer fraud and countermeasures
- Computer security
- Computer security
- Computer security : a comprehensive controls checklist
- Computer security and protection structures
- Computer security handbook : strategies and techniques for preventing data loss or theft
- Computer security management
- Computer security solutions
- Computer security subsystem interpretation of the trusted computer system evaluation criteria
- Computer-security technology
- Computers : crimes, clues and controls : a management guide
- Computers and privacy : implications of a management tool
- Computers in the management of senate committee activities
- Computers, business, and security : the new role for security
- Computers, personnel administration, and citizen rights
- Considerations in the selection of security measures for automatic data processing systems : contributed to the Federal Information Processing Standards Task Group 15-Computer Systems Security
- Control and security of computer information systems
- Critical information infrastructures : resilience and protection
- Critical information infrastructures : resilience and protection
- Cryptography and data security
- Cryptography and security
- Cryptography and security services : mechanisms and applications
- Cryptography, a primer
- Cryptology unlocked
- Data base and computer systems security
- Data protection and data access : reports from ten countries on data protection and data access in social research, with an annotated international bibliography
- Data security and data processing
- Database security and integrity
- Department of Defense trusted computer system evaluation criteria
- Design alternatives for computer network security
- Designing an IAM framework with Oracle Identity and access management suite
- Differential cryptanalysis of the data encryption standard
- Digital identity guidelines : enrollment and identity proofing
- Disaster recovery : contingency planning and program evaluation
- Ein universelles Konzept zum flexiblen Informationsschutz in und mit Rechensystemen
- Electronic funds transfer : oversight of critical banking systems should be strengthened
- Electronic government : progress in promoting adoption of smart card technology
- Electronic government : progress in promoting adoption of smart card technology : report to the chairman, Subcommittee on Technology and Procurement Policy, House of Representatives
- Entity authentication using public key cryptography
- Evaluation of U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Management Act and efforts to protect sensitive agency information : (fiscal year 2006)
- Executive guide to the protection of information resources
- Federal information systems remain highly vulnerable to fraudulent, wasteful, abusive, and illegal practices : report
- Federated identity primer
- Foiling the system breakers : computer security and access control
- Formal verification of an operating system security kernel
- Fundamentals of cryptology : a professional reference and interactive tutorial
- Git : mastering version control : learn everything you need to take full control of your workflow with Git with this curated Learning Path - dive in and transform the way you work : a course in three modules
- Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available
- Git essentials : create, merge, and distribute code with Git, the most powerful and flexible versioning system available
- Git essentials LiveLessons
- Gitolite essentials : leverage powerful branch and user access control with Git for your own private collaborative repositories
- Global monitoring : the challenges of access to data
- Handbook for information security : a guide towards information security standards
- Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
- How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN
- How to prevent computer crime : a guide for managers
- Identity and access management : business performance through connected intelligence
- Identity-based encryption
- Implementing message systems in multilevel secure environments : problems and approaches
- Information Security Policy Development for Compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0
- Information integrity : a structure for its definition and management
- Information processing and security systems
- Information protection and other unnatural acts : every manager's guide to keeping vital computer data safe and sound
- Information systems : agencies overlook security controls during development : report to the Chairman, Committee on Science, Space, and Technology, House of Representatives
- Information systems security
- Infosecurity 2008 threat analysis
- Integrated Security Systems Design : Concepts, Specifications, and Implementation
- Integrity analysis : a methodology for EDP audit and data quality assurance
- Internet and Intranet security
- Intrusion detection in distributed systems : an abstraction-based approach
- Intrusion detection networks : a key to collaborative security
- Intrusion detection with Snort
- Junos Security
- KMI : key management infrastructure
- Kali Linux 2 : Windows penetration testing : Kali Linux : a complete pentesting toolkit facilitating smooth backtracking for working hackers
- Kali Linux 2 : assuring security by penetration testing : Kali Linux : achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition
- Kali Linux cookbook : effective penetration testing solutions
- Kali Linux intrusion and exploitation cookbook : over 70 recipes for system administrators or DevOps to master Kali Linux 2 and perform effective security assessments
- Kali Linux network scanning cookbook : take your penetration-testing skills to the next level
- Kali Linux tutorial for beginners
- Kali Linux wireless penetration testing : beginner's guide : master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
- Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
- Kali Linux, an ethical hacker's cookbook : practical recipes that combine strategies, attacks, and tools for advanced penetration testing
- Learn Git in 3 hours
- Library public access workstation authentication
- Linux firewalls
- Linux firewalls : enhancing security with nftables and beyond
- Managed code rootkits : hooking into runtime environments
- Management guide to the protection of information resources
- Managing SQL Server encryption certificates : getting started with SQL Server encryption
- Managing information security : a program for the electronic information age
- Managing information security : administrative, electronic, and legal measures to protect business information
- Managing security with Snort and IDS tools
- Mastering Metasploit - Fourth Edition
- Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
- Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
- Mastering Metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach
- Mastering Windows Server 2012 R2
- Metasploit : Das Handbuch zum Penetration-Testing-Framework
- Metasploit : the penetration tester's guide
- Metasploit Penetration Testing Cookbook
- Metasploit penetration testing cookbook : evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
- Metasploit revealed : secrets of the expert pentester : build your defense against complex attacks : a course in three modules
- Microservices security in action
- Modern authentication with Azure Active Directory for web applications
- Modern cryptology : a tutorial
- Modern cryptology : a tutorial
- Modern methods for computer security and privacy
- Multivariate public key cryptosystems
- Multivariate public key cryptosystems
- NASA guidelines for assuring the adequacy and appropriateness of security safeguards in sensitive applications
- Network scanning cookbook : practical network security using Nmap and Nessus 7
- Network security : private communication in a public world
- Network security tools
- PKI uncovered
- Password & internet addresses journal for dummies
- Penetration tester's open source toolkit
- Penetration tester's open source toolkit
- Pocket guide for the review of any computer system
- Practical deployment of Cisco Identity Services Engine (ISE) : real-world examples of AAA deployments
- Practical intrusion analysis : prevention and detection for the twenty-first century
- Practical network scanning : capture network vulnerabilities using standard tools such as Nmap and Nessus
- Principles of data security
- Privacy, security, and the information processing industry
- Privacy-respecting intrusion detection
- Pro ASP.NET Core Identity : under the hood with authentication and authorization in ASP.NET Core 5 and 6 applications
- Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings
- Protecting information in the electronic workplace : a guide for managers
- Public-key cryptography
- Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991 : final report
- Public-key cryptography : state of the art and future directions : E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991 : final report
- Risk analysis and control : a guide for DP managers
- Robots, piratas y spam (santo cielo! : Botnets and hackers and spam (oh, my!)
- Rootkit arsenal : escape and evasion in the dark corners of the system
- Rootkits : subverting the Windows kernel
- Secrecy, authentication, and public key systems
- Securing the perimeter : deploying identity and access management with free open source software
- Security for dial-up lines
- Security for wireless sensor networks using identity-based cryptography
- Security safeguards for the computer
- Smart card technology : new methods for computer access control
- Snort : IDS and IPS toolkit
- Snort cookbook
- System implications of information privacy
- Systems design for data protection
- Technology solutions for a safer world
- The Complete computer virus handbook
- The Politics of privacy : planning for personal data systems as powerful technologies
- The SRI hierarchical development methodology (HDM) and its application to the development of secure software
- The basics of digital privacy : simple tools to protect your personal information and your identity online
- The design and implementation of the National Bureau of Standards' network access machine (NAM)
- The modelling and analysis of security protocols : the CSP approach
- The net delusion : the dark side of internet freedom
- The network security center : a system level approach to computer network security
- The right of privacy in the computer age
- The rise of the computer state
- The state of the art in intrusion prevention and detection
- Top secret/trade secret : accessing and safeguarding restricted information
- Transborder data flows and Brazil : the role of transnational corporations, impacts of transborder data flows, and effects of national policies : (the Brazilian case study)
- Transparent user authentication : biometrics, RFID and behavioural profiling
- Trusted UNIX Working Group (TRUSIX) rationale for selecting access control list features for the UNIX® system
- Understanding intrusion detection systems : detecting attackers and incidents inside your hosts and networks
- VA's new computer system has potential to protect privacy of individuals claiming benefits : report
- VA's new computer system has potential to protect privacy of individuals claiming benefits : report
- Versionsverwaltung mit Git
- Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux
- Wired China : who's hand is on the switch : roundtable before the Congressional-Executive Commission on China, One Hundred Seventh Congress, second session, April 15, 2002
- Wired China : who's hand is on the switch : roundtable before the Congressional-Executive Commission on China, One Hundred Seventh Congress, second session, April 15, 2002
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/3zDya3l8xtw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/3zDya3l8xtw/">Computers -- Access control</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computers -- Access control
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/3zDya3l8xtw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/3zDya3l8xtw/">Computers -- Access control</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>