Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Computers - Access control"'
Refine your search
Availability
Limit to records with available items
Authors
Barken, Lee
Chandramouli, Ramasw...
Clark, Champ
Deibert, Ronald
Ferraiolo, David
Heary, Jamey
Jajodia, Sushil
Kaufman, Charlie
Koziol, Jack
Kuhn, D. Richard
Laliberte, Scott
Madhavan, C. E. Veni
Mogollon, Manuel
Norman, Thomas
Palfrey, John
Perlman, Radia
Pohlman, Marlin B
Salomaa, Arto
Scheidel, Jeff
Suehring, Steve
Show more
Show less
Item types
Books
English Books
Topics
Computer networks - ...
Computer networks - ...
Computer networks - ...
Computer science
Computer security
Computer security - ...
Computer viruses
Computers - Access c...
Computers - Access c...
Computers - Access c...
Confidential busines...
Corporate governance
Database security
Firewalls (Computer ...
Internet - Censorshi...
Internet - Governmen...
Linux
Public key cryptogra...
Rootkits (Computer s...
Software measurement
Show more
Show less
Your search returned 30 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Mechanics of user identification and authentication : fundamentals of identity management
Dobromir Todorov
by
Todorov, Dobromir
Publication details:
Boca Raton, FL
Auerbach Publications
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TOD
.
2.
Network security : private communication in a public world
Charlie Kaufman, Radia Perlman, Mike Speciner
by
Kaufman, Charlie
Perlman, Radia
Speciner, Michael
Edition:
2nd ed
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KAU
.
3.
Oracle identity management : governance, risk, and compliance architecture
Marlin B. Pohlman
by
Pohlman, Marlin B
Edition:
3rd ed
Publication details:
Boca Raton, FL
CRC Press
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.7575 O POH
.
4.
Penetration tester's open source toolkit
Aaron W. Bayles, technical editor and contributor ... [et al.]
by
Bayles, Aaron W
Publication details:
Rockland, MA
Syngress Publishing
c2007-
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BAY
.
5.
Practical intrusion analysis : prevention and detection for the twenty-first century
Ryan Trost
by
Trost, Ryan
Publication details:
Boston, MA
Addison Wesley
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 TRO
.
6.
Practical intrusion detection handbook
Paul E. Proctor
by
Proctor, Paul E
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PRO
.
7.
Professional rootkits
Ric Vieler
by
Vieler, Ric
Publication details:
Indianapolis, IN
Wiley/Wrox
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VIE
.
8.
Public-key cryptography
Arto Salomaa
by
Salomaa, Arto
Edition:
2nd, enl. ed
Publication details:
Berlin
Springer
c1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.82 SAL
.
9.
Public-key cryptography : theory and practice
Abhijit Das, C. E. Veni Madhavan
by
Das, Abhijit
Madhavan, C. E. Veni
Publication details:
Upper Saddle River, NJ
Pearson Education
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DAS
.
10.
The rootkit arsenal : escape and evasion in the dark corners of the system
Bill Blunden
by
Blunden, Bill
Publication details:
Plano, TX
Wordware Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BLU
.
11.
Composition of secure multi-party protocols : a comprehensive study
Yehuda Lindell
by
Lindell, Yehuda
Publication details:
Berlin ; New York
Springer
2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.62 LIN
.
12.
Cryptography and security services : mechanisms and applications
Manuel Mogollon
by
Mogollon, Manuel
Publication details:
Hershey, PA
Cybertech Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MOG
.
13.
Designing an IAM framework with Oracle identity and access management suite
Jeff Scheidel
by
Scheidel, Jeff
Publication details:
New York
Oracle/McGraw-Hill
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
14.
Hack I.T. : security through penetration testing
T.J. Klevinsky, Scott Laliberte, and Ajay Gupta
by
Klevinsky, T. J
Gupta, Ajay
Laliberte, Scott
Publication details:
Upper Saddle River, NJ
Addison-Wesley
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KLE
.
15.
No cover image available
How secure is your wireless network? : safeguarding your Wi-Fi-LAN
Lee Barken
by
Barken, Lee
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BAR
.
16.
Infosecurity 2008 threat analysis
[authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford
by
Clark, Champ
Publication details:
Rockland, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
17.
Integrated security systems design : concepts, specifications, and implementation
Thomas Norman
by
Norman, Thomas
Publication details:
Amsterdam ; Boston, MA
Elsevier Butterworth-Heinemann
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NOR
.
18.
Intrusion detection in distributed systems : an abstraction-based approach
by Peng Ning, Sushil Jajodia, X. Sean Wang
by
Ning, Peng
Jajodia, Sushil
Wang, Sean
Publication details:
Dorcrecht ; Boston
Kluwer Academic Publishers
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NIN
.
19.
Intrusion detection with snort
Jack Koziol
by
Koziol, Jack
Publication details:
Indianapolis, IN
SAMS
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KOZ
.
20.
Intrusion signatures and analysis
Stephen Northcutt ... [et al.]
by
Northcutt, Stephen
Edition:
1st ed
Publication details:
Indianapolis, IN
New Riders
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NOR
.
21.
IT security governance guidebook with security program metrics on CD-ROM
Fred Cohen
by
Cohen, Frederick B
Publication details:
Boca Raton, FL
Auerbach Publications/Taylor & Francis
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 COH
.
22.
Linux firewalls
Steve Suehring, Robert Ziegler
by
Suehring, Steve
Ziegler, Robert L
Edition:
3rd ed
Publication details:
Indianapolis, Ind
Novell Press
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SUE
.
23.
802.1X port-based authentication
Edwin Lyle Brown
by
Brown, Edwin Lyle
Publication details:
Boca Raton
Auerbach
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BRO
.
24.
Cisco NAC appliance : enforcing host security with clean access
Jamey Heary ; contributing authors, Jerry Lin, Chad Sullivan, Alok Agrawal
by
Heary, Jamey
Publication details:
Indianapolis, IN
Cisco Press
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HEA
.
25.
Cisco NAC appliance : enforcing host security with clean access
Jamey Heary ; contributing authors, Jerry Lin, Chad Sullivan, Alok Agrawal
by
Heary, Jamey
Publication details:
Indianapolis, IN
Cisco Press
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
TK5105.59 .H42 2008 005.8
.
26.
Role-based access control
David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli
by
Ferraiolo, David
Chandramouli, Ramaswamy
Kuhn, D. Richard
Publication details:
Boston
Artech House
c2003
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 FER, ..
.
27.
Access controlled : the shaping of power, rights, and rule in cyberspace
Ronald Deibert ... [et al.], editors
by
Deibert, Ronald
Palfrey, John
Rohozinski, Rafal
OpenNet Initiative
Publication details:
Cambridge, Mass
MIT Press
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DEI
.
28.
Access denied : the practice and policy of global Internet filtering
edited by Ronald Deibert ... [et al.]
by
Deibert, Ronald
Publication details:
Cambridge, Mass
MIT Press
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DEI
.
29.
An information security handbook
John M.D. Hunter
by
Hunter, John M. D
Publication details:
Berlin
Springer
c2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HUN
.
30.
Role-based access control
David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli
by
Ferraiolo, David
Chandramouli, Ramaswamy
Kuhn, D. Richard
Publication details:
Boston
Artech House
c2003
Availability:
No items available.
Pages
Find us on the map
Powered by
Koha