1. Modeling and analysis of security protocols

by Ryan, Peter | Goldsmith, Michael | Lowe, Gavin | Schneider, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Harlow: Addison-Wesley, 2001Availability: Items available for loan: [Call number: 005.8 RYA] (1).
2. Role-based access control

by Ferraiolo, David F.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2003Availability: Items available for loan: [Call number: 005.8 FER] (1).
3. Biometrics : Identity assurance in the information age

by Woodward, John D | Higgins, Peter | Orlans, Nicholas M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: McGraw-Hill Osborne Media, 2003Availability: Items available for loan: [Call number: 621.38928 WOO] (1).
4. Securing biometrics applications

by Shoniregun, Charles A | Crosier, Stephen.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 363.23 SHO] (1).
5. Role-Based Access Control

by Ferraiolo, David F | Chandramouli, Ramaswamy | Kuhn, D. Richard.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Artech House, 2007Availability: Items available for loan: [Call number: 005.8 FER] (1).
6. Emerging challenges for security, privacy and trust

by Gritzalis, Dimitris | Lopez, Javier.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2009Availability: Items available for loan: [Call number: 005.8 GRI] (1).
7. Information flow based security control beyond RBAC how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access control (RBAC)

by Fischer-Hellmann, Klaus-Peter.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Wiesbaden: Springer-Verlag, 2012Availability: Items available for loan: [Call number: 005.8 FIS] (1).
8. Hacker's handbook : the strategy behind breaking into and defending networks

by Susan Young | Aitel, Dav.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Roca Raton: CRC Press, 2003Availability: Items available for loan: [Call number: 005.8 SUS] (1).

Powered by Koha