Explore: Access Control
Discover books, insights, and more — all in one place.
Learn more about Access Control with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “access-control”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1Network Security Assessment
By Chris McNab

“Network Security Assessment” Metadata:
- Title: Network Security Assessment
- Author: Chris McNab
- Languages: ➤ Spanish; Castilian - español, castellano - English
- Number of Pages: Median: 478
- Publisher: ➤ O'Reilly Media, Inc. - O'Reilly Media, Incorporated - Anaya Multimedia - O'Reilly - O'Reilly Media
- Publish Date: ➤ 2004 - 2005 - 2007 - 2008 - 2016
- Publish Location: ➤ Sebastopol, CA - Cambridge - Sebastopol - Beijing
“Network Security Assessment” Subjects and Themes:
- Subjects: ➤ Access control - Computer networks - Computers - Evaluation - Security measures - Computer networks, security measures - Computers, access control - Database security - Data protection - Computer security - Data encryption (Computer science)
Edition Identifiers:
- The Open Library ID: ➤ OL23691203M - OL22133719M - OL36716419M - OL3327684M - OL36706371M - OL23399927M - OL13267854M - OL23635962M - OL36707449M - OL9513003M - OL23556906M - OL36716538M - OL26836814M
- Online Computer Library Center (OCLC) ID: 180989270 - 57059486
- Library of Congress Control Number (LCCN): 2009419532 - 2004302106
- All ISBNs: ➤ 9780596519339 - 0596510306 - 9781306816878 - 149191095X - 9780596510305 - 059600611X - 9788441517516 - 8441517517 - 0596519338 - 1306816874 - 1306817455 - 9781491910955 - 9780596520809 - 0596520808 - 9781306817455 - 9780596006112
Author's Alternative Names:
"Christopher Ross McNab" and "Christopher R. McNab"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Network Security Assessment at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Deployment Guide Series
By IBM Redbooks

“Deployment Guide Series” Metadata:
- Title: Deployment Guide Series
- Author: IBM Redbooks
- Language: English
- Number of Pages: Median: 286
- Publisher: ➤ IBM International Technical Support Organization - IBM Corp., International Technical Support Organization - Vervante - IBM.Com/Redbooks - Ibm - IBM
- Publish Date: 2005 - 2006 - 2007
- Publish Location: ➤ [Austin, Tex.] - [United States?]
“Deployment Guide Series” Subjects and Themes:
- Subjects: ➤ Electronic data processing - Distributed processing - Tivoli storage manager - Business - Data processing - Security measures - Electronic commerce - Computer networks - Access control - Computer security - IBM Tivoli identity manager - Information technology - Management - Banks and banking - IBM software - IBM Tivoli security compliance manager - Software maintenance - Composite applications (Computer science) - Application software - Development - IBM Tivoli Monitoring - WebSphere - Computers - Storage area networks (Computer networks) - File organization (Computer science) - Database management - Configuration management - Software configuration management - IBM Tivoli configuration manager - Computer systems - Evaluation
Edition Identifiers:
- The Open Library ID: ➤ OL10607044M - OL10607351M - OL10607512M - OL10607308M - OL17437165M - OL10607033M - OL10607479M - OL17437186M - OL10607350M - OL10607467M - OL10607414M - OL10607206M - OL17434677M - OL10607435M - OL10607005M
- Online Computer Library Center (OCLC) ID: ➤ 805416887 - 84835692 - 236484511 - 808511428 - 171287748 - 85860351 - 82772310 - 84900628 - 173136787 - 236484432 - 806221402 - 810455421
- Library of Congress Control Number (LCCN): ➤ 2006284059 - 2005280826 - 2007272549 - 2006271520 - 2007279654 - 2007279655 - 2006271532 - 2005284166 - 2006275827 - 2006286805 - 2006284882 - 2006286434
- All ISBNs: ➤ 9780738494203 - 9780738495927 - 9780738491981 - 0738497444 - 0738497061 - 9780738496832 - 9780738497068 - 0738494208 - 9780738497440 - 9780738486154 - 0738496839 - 9780738494197 - 0738494194 - 9780738496245 - 0738490067 - 0738496243 - 0738495921 - 9780738493701 - 0738486159 - 0738493708 - 0738489948 - 9780738489940 - 0738491985 - 9780738490069
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Deployment Guide Series at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Understanding Network Hacks
By Bastian Ballmann

“Understanding Network Hacks” Metadata:
- Title: Understanding Network Hacks
- Author: Bastian Ballmann
- Language: English
- Number of Pages: Median: 192
- Publisher: ➤ Springer Berlin / Heidelberg - Springer
- Publish Date: 2015 - 2016 - 2021 - 2022
“Understanding Network Hacks” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Computer security - Python (computer program language) - Computer networks - Security measures - Access control - Python (Computer program language) - Réseaux d'ordinateurs - Sécurité - Mesures - Sécurité informatique - Python (Langage de programmation) - COMPUTERS - Networking - Security
Edition Identifiers:
- The Open Library ID: OL37269197M - OL37332320M - OL37312955M - OL28266079M - OL37416972M
- Online Computer Library Center (OCLC) ID: 900539794
- All ISBNs: ➤ 9783662444368 - 9783662444375 - 9783662508626 - 9783662621592 - 3662444372 - 3662621568 - 3662508621 - 3662621592 - 9783662621561 - 3662444364
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Understanding Network Hacks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Biometrics
By Woodward, John D. Jr.

“Biometrics” Metadata:
- Title: Biometrics
- Author: Woodward, John D. Jr.
- Language: English
- Number of Pages: Median: 227
- Publisher: ➤ McGraw-Hill/Osborne - RAND, Arroyo Center - McGraw-Hill - RAND
- Publish Date: 2001 - 2003
- Publish Location: ➤ London - New York - Santa Monica, CA
“Biometrics” Subjects and Themes:
- Subjects: ➤ Access control - Automation - Biometric identification - Computer Technology - Computer networks - Human face recognition (Computer science) - Identification - Nonfiction - Pattern recognition systems - Prevention - Technological innovations - Terrorism - Optical Data Processing - COMPUTERS - Biometry
Edition Identifiers:
- The Open Library ID: OL3671064M - OL3600218M - OL3774940M - OL22009939M - OL24293521M
- Online Computer Library Center (OCLC) ID: 48630554 - 51618030
- Library of Congress Control Number (LCCN): 2002728245 - 2003535370 - 2002328657
- All ISBNs: 9780072222272 - 0072230304 - 9780072230307 - 0072222271
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Biometrics at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5When Google Met Wikileaks
By Julian Assange

“When Google Met Wikileaks” Metadata:
- Title: When Google Met Wikileaks
- Author: Julian Assange
- Language: English
- Number of Pages: Median: 223
- Publisher: OR Books
- Publish Date: 2014
- Publish Location: New York, USA
“When Google Met Wikileaks” Subjects and Themes:
- Subjects: ➤ Google - surveillance - nsa - WikiLeaks (Organization) - Access control - Leaks (Disclosure of information) - Internet - Google (Firm) - Information society - Freedom of information - Wikileaks (organization) - Assange, julian, 1971- - Internet, political aspects
- People: Eric Schmidt - Julian Assange (1971-)
Edition Identifiers:
- The Open Library ID: OL25763336M
- Online Computer Library Center (OCLC) ID: 889756362
- All ISBNs: 9781939293589 - 1939293588 - 193929357X - 9781939293572
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find When Google Met Wikileaks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6WikiLeaks and the Age of Transparency
By Micah L. Sifry and Micah Sifry

“WikiLeaks and the Age of Transparency” Metadata:
- Title: ➤ WikiLeaks and the Age of Transparency
- Authors: Micah L. SifryMicah Sifry
- Language: English
- Number of Pages: Median: 213
- Publisher: ➤ Yale University Press - Counterpoint - OR Books - Scribe Publications
- Publish Date: 2011
- Publish Location: New York
“WikiLeaks and the Age of Transparency” Subjects and Themes:
- Subjects: ➤ Wikileaks (organization) - Official secrets - Disclosure of information - Government information - Political aspects - WikiLeaks (Organization) - Access control - Transparency in government - Freedom of information - WikiLeaks - Wikis (Computer science) - Leaks (Disclosure of information)
Edition Identifiers:
- The Open Library ID: OL29065956M - OL34004992M - OL26484421M - OL27640712M - OL24605334M
- Online Computer Library Center (OCLC) ID: 701806381
- Library of Congress Control Number (LCCN): 2012285899
- All ISBNs: ➤ 9780300176766 - 9781921753800 - 1935928317 - 9781935928324 - 1582437793 - 9781582437798 - 9781935928317 - 1935928325 - 0300176767 - 1921753803
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find WikiLeaks and the Age of Transparency at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Medicare
By United States. General Accounting Office
“Medicare” Metadata:
- Title: Medicare
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 30
- Publisher: ➤ GAO - U.S. General Accounting Office [distributor - The Office [distributor - U.S. General Accounting Office - The Office, distributor - The Office
- Publish Date: ➤ 1986 - 1987 - 1988 - 1989 - 1990 - 1991 - 1992 - 1994 - 1995 - 1996 - 1997 - 1998 - 1999 - 2000 - 2002
- Publish Location: ➤ Gaithersburg, Md. (P.O. Box 6015, Gaithersburg 20877) - [Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20884-6015) - Washington, D.C - Washington, D.C. (441 G St., NW, Rm. LM, Washington 20548) - Washington, D.C. (P.O. Box 37050, Washington 20013) - Washington, D.C. (441 G St., NW, Rm. LM, Washington, 20548) - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20877) - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20884-6015) - Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) - [Washington, D.C.]
“Medicare” Subjects and Themes:
- Subjects: ➤ Access control - Accounting - Acute renal failure - Allied health personnel - Ambulance service - Anesthesia - Anesthesiologists - Auditing - Blue Shield of Massachusetts - Claims administration - Confidential communications - Corrupt practices - Cost - Cost control - Cost of Medical care - Costs - Diagnostic imaging - Dialysis - Disability Insurance - Economic aspects - Economic aspects of Diagnostic imaging - Economic aspects of Medical laws and legislation - Employee fringe benefits - Evaluation - Federal aid to medical education - Fees - Finance - Government contractors - Government policy - Health Care Fraud and Abuse Control Program (U.S.) - Health Insurance - Health maintenance organizations - HealthChoice (Firm) - Hemodialysis - Home care services - Home health aides - Hospices (Terminal care) - Hospital care - Hospitals - Insurance, Disability - Insurance, health - Intensive care units - Invoices - Law and legislation - Magnetic resonance imaging - Managed care plans (Medical care) - Management - Medical care - Medical care, Cost of - Medical education - Medical fees - Medical instruments and apparatus - Medical instruments and apparatus industry - Medical laboratories - Medical laws and legislation - Medical records - Medical supplies industry - Medicare - Medicare fraud - Mid-Delta Home Health (Firm) - Nursing home care - Nursing homes - Occupational therapy - Older people - Pathological laboratories - Prevention - Prospective payment - Quality control - Rates - Research - Rules and practice - Salaries - Security measures - Speech therapy - States - Teaching hospitals - Transportation - Treatment - United States - United States. Dept. of Health and Human Services. Office of Inspector General - United States. Dept. of Justice - United States. Health Care Financing Administration - Utilization review
- Places: ➤ Florida - Maine - Mississippi - New Hampshire - United States - Vermont
Edition Identifiers:
- The Open Library ID: ➤ OL15244924M - OL15360005M - OL14659801M - OL14898783M - OL17934420M - OL14660513M - OL15012056M - OL14698007M - OL14668463M - OL15244764M - OL14668459M - OL14900317M - OL14898835M - OL14678188M - OL14660174M - OL15300805M - OL14660198M - OL14963140M - OL14659394M - OL14658649M - OL14658889M - OL14527979M - OL14809319M - OL14659411M - OL15305978M - OL15243691M - OL15244684M - OL18000528M - OL15335554M - OL14967251M - OL14651929M - OL14659753M - OL14963034M - OL15394919M - OL14668403M - OL15301421M - OL15243694M - OL14898862M - OL15331776M - OL14658650M - OL14696147M - OL15332788M - OL14677861M - OL15301519M - OL22842866M
- Online Computer Library Center (OCLC) ID: 50132571
Author's Alternative Names:
"General Accounting Office (U.S.)", "General Accountability Office (U.S.)", "United States. General of Accounting Office.", "United States. General Accounting Office.", "U S. General Accounting Office", "U.S. General Accounting Office", "General Accounting Office.", "United States. General Accounting OFfice.", "U.S. General Accounting Office.", "United States General Accounting Office " and "United States General Accounting Office.",Access and General Info:
- First Year Published: 1986
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Medicare at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Number of Pages: Median: 299
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses - Computer networks, security measures - Open source software
Edition Identifiers:
- The Open Library ID: OL24896075M
- Online Computer Library Center (OCLC) ID: 754641929
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Security in computing
By Charles P. Pfleeger, Charles P. Pfleeger, Shari Lawrence Pfleeger and Jonathan Margulies

“Security in computing” Metadata:
- Title: Security in computing
- Authors: Charles P. PfleegerCharles P. PfleegerShari Lawrence PfleegerJonathan Margulies
- Language: English
- Number of Pages: Median: 746
- Publisher: ➤ Prentice-Hall International - Prentice Hall PTR - Pearson Education, Limited - Prentice Hall
- Publish Date: ➤ 1989 - 1996 - 2002 - 2003 - 2006 - 2015
- Publish Location: ➤ [London] - Upper Saddle River, N.J - London - Upper Saddle River, NJ
“Security in computing” Subjects and Themes:
- Subjects: ➤ Computer security - Data protection - Right of Privacy - Rechnernetz - Datensicherung - Computerbeveiliging - Computers - Access control - Firewalls (Computer security) - Operating systems (Computers) - Linux - Privacy, Right of
Edition Identifiers:
- The Open Library ID: ➤ OL35566361M - OL9294548M - OL7339893M - OL25651390M - OL28953547M - OL9286053M - OL7331405M - OL16578902M - OL22148780M
- Online Computer Library Center (OCLC) ID: 50676236 - 71004261
- Library of Congress Control Number (LCCN): 2014043643 - 2006026798 - 2002034368 - 2014038579
- All ISBNs: ➤ 0137990162 - 9780132390774 - 9780130355485 - 0131857940 - 9780134085043 - 0134085051 - 0132390779 - 9780134085050 - 9780137990160 - 0134085043 - 0130355488 - 9780131857940
Author's Alternative Names:
"Shari Pfleeger"Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Public hearing before Senate Judiciary Committee
By New Jersey. Legislature. Senate. Judiciary Committee.
“Public hearing before Senate Judiciary Committee” Metadata:
- Title: ➤ Public hearing before Senate Judiciary Committee
- Author: ➤ New Jersey. Legislature. Senate. Judiciary Committee.
- Language: English
- Number of Pages: Median: 81
- Publisher: ➤ The Hearing Unit - The Committee - Senate Judiciary Committee - Office of Legislative Services, Public Information Office, Hearing Unit
- Publish Date: ➤ 1989 - 1990 - 1992 - 1993 - 1994 - 1995 - 1997 - 1998 - 1999 - 2000 - 2001
- Publish Location: ➤ Trenton, N.J. (162 W. State St., CN 068, Trenton 08625-0068) - Trenton, N.J - Trenton, N.J. (State House Annex, CN 068, Trenton 08625 ) - Trenton, N.J. (State House Annex, Trenton 08625-0068) - Trenton, N.J. (162 W. State St., CN 068, Trenton 08625-00) - Trenton, N.J. (State House Annex, PO BOX 068, Trenton 08625-0068) - Trenton, N.J. (State House Annex, CN 068, Trenton 08625)
“Public hearing before Senate Judiciary Committee” Subjects and Themes:
- Subjects: ➤ Access control - Asbestos - Automobile theft - Campaign funds - Capital punishment - Casinos - Child molesters - Child sexual abuse - Child support - Children - Children in pornography - Civil rights - Compulsive gambling - Courts - Discipline - Disclosure of information - Discrimination in law enforcement - Environmental law - Evaluation - Finance - Freedom of information - Gambling - Government policy - Housing authorities - Indians of North America - Information services - Intergovernmental fiscal relations - Judges - Juvenile delinquency - Land use - Law and legislation - Lead - Legal status, laws - Limitation of actions - Medical care - Minorities - New Jersey - New Jersey. Bureau of Parole - New Jersey. Dept. of Environmental Protection - New Jersey. Division of State Police - New Jersey. State Parole Board - Officials and employees - Overcrowding - Parole - Police misconduct - Police murders - Prison sentences - Prisoners - Prisons - Probation - Prostitution - Public housing - Public records - Racial profiling in law enforcement - Referendum - Regional planning - Reorganization - Searches and seizures - Sentences (Criminal procedure) - Sex offenders - Sexual harassment of women - Sports betting - State Police - Trials, litigation - Unfunded mandates - New Jersey. Department of Environmental Protection - Child pornography
- People: Christopher J. Daggett - Edward J. Seaman (1937-) - Peter Verniero - Robert Simon
- Places: New Jersey - Pennsylvania - Pine Barrens - Wildwood
Edition Identifiers:
- The Open Library ID: ➤ OL1360102M - OL460110M - OL1239397M - OL1048155M - OL1240540M - OL1360518M - OL6833345M - OL939099M - OL3997901M - OL938817M - OL3997898M - OL1815248M - OL1048154M - OL1240541M - OL938815M - OL939085M - OL121994M - OL1240298M - OL632241M - OL1049555M - OL1049556M - OL1047918M - OL408314M - OL1361911M - OL632199M
- Online Computer Library Center (OCLC) ID: ➤ 46928423 - 42136420 - 30334544 - 30803216 - 37702788 - 33094596 - 29607348 - 46633548 - 34084950 - 39329686 - 26755264 - 33811623 - 33152091 - 19346652 - 30696028 - 33924981 - 44431132 - 33327247
- Library of Congress Control Number (LCCN): ➤ 93622564 - 98109369 - 95622835 - 95622837 - 93620751 - 92622585 - 94620730 - 94622184 - 94622183 - 93622563 - 00327723 - 98178146 - 92620702 - 93620750 - 96620227 - 89621616 - 95623178 - 2001344183 - 99488732 - 95623162 - 94621896 - 92620192 - 96620179 - 93620411 - 2001344180
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Public hearing before Senate Judiciary Committee at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
1163 Documents the Government Doesn't Want You to Read
By Jesse Ventura

“63 Documents the Government Doesn't Want You to Read” Metadata:
- Title: ➤ 63 Documents the Government Doesn't Want You to Read
- Author: Jesse Ventura
- Language: English
- Number of Pages: Median: 312
- Publisher: ➤ Skyhorse - Skyhorse Publishing Company, Incorporated - Skyhorse Publishing
- Publish Date: 2011 - 2012 - 2020
“63 Documents the Government Doesn't Want You to Read” Subjects and Themes:
- Subjects: ➤ Official secrets - Government information - Conspiracies - Access control - United states, politics and government - nyt:combined-print-and-e-book-nonfiction=2011-04-24 - New York Times bestseller
Edition Identifiers:
- The Open Library ID: OL29862085M - OL27597212M - OL24627511M - OL24645309M
- Online Computer Library Center (OCLC) ID: 668194119
- Library of Congress Control Number (LCCN): 2011006218
- All ISBNs: ➤ 9781616085711 - 1616082267 - 1616085711 - 9781616082260 - 9781510759589 - 1510759581
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find 63 Documents the Government Doesn't Want You to Read at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12The net delusion
By Evgeny Morozov, E. Morozov and Eduardo G. Murillo

“The net delusion” Metadata:
- Title: The net delusion
- Authors: Evgeny MorozovE. MorozovEduardo G. Murillo
- Languages: rus - English
- Number of Pages: Median: 432
- Publisher: ➤ Ediciones Destino - Allen Lane : Penguin Books - АСТ - PENGUIN UK - PublicAffairs - Public Affairs - Penguin Books, Limited - Penguin Press/Classics
- Publish Date: 2011 - 2012 - 2014
- Publish Location: New York - Москва, Россия
“The net delusion” Subjects and Themes:
- Subjects: ➤ Political aspects - Censorship - Access control - Internet - Freedom of information - Computers - Internet, political aspects - Information society - New York Times reviewed - Computers, access control - Aspect politique - Censure - Liberté d'information - Société numérique - Media Studies - Informationsfreiheit - Zensur - Propaganda - Privatsphäre - Datenschutz - Zugriffskontrolle - Politik - Politiska aspekter - Censur - Informationsfrihet - Informationssamhället - Demokratisering - Internet--political aspects - Internet--censorship - Computers--access control - Hm851 .m665 2011 - 303.48/33 - Social networking - Civil rights - Fascism & totalitarianism - Professional, career & trade -> computer science -> internet & www - Cs.soc_sci.poli_sci.gen_polit_sc
Edition Identifiers:
- The Open Library ID: ➤ OL51723733M - OL47503415M - OL47503414M - OL28259613M - OL38790658M - OL34830709M - OL34497928M - OL34471632M - OL29078442M - OL27595510M - OL24384759M
- Online Computer Library Center (OCLC) ID: 806162088 - 820727695 - 515438457
- Library of Congress Control Number (LCCN): 2010039066
- All ISBNs: ➤ 9781280588075 - 9780141961828 - 1610391632 - 0141961821 - 1280588071 - 9785170847921 - 9781610391634 - 9781586488741 - 9781846143533 - 1846143535 - 5170847920 - 9780141049571 - 9781586488758 - 1610391063 - 1586488759 - 9781610391061 - 8423327795 - 1586488740 - 014104957X - 9788423327799
Author's Alternative Names:
"Evgeny V. Morozov" and "Евгений Морозов"Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The net delusion at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Tax systems modernization
By United States. General Accounting Office
“Tax systems modernization” Metadata:
- Title: Tax systems modernization
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 26
- Publisher: ➤ GAO - The Office - The Office [distributor
- Publish Date: ➤ 1991 - 1992 - 1993 - 1994 - 1995 - 1996 - 1997 - 1998 - 1999 - 2000
- Publish Location: ➤ Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20877) - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20884-6015) - Washington, D.C
“Tax systems modernization” Subjects and Themes:
- Subjects: ➤ United States - United States. Internal Revenue Service - Tax administration and procedure - Data processing - Automation - Evaluation - Management - Appropriations and expenditures - Administrative agencies - Procurement - Electronic filing systems - Public records - Access control - United States. National Technical Information Service - Computer security - Auditing - Government consultants - Timetables - Tax returns - Tax collection - Personnel management - Planning
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL17837198M - OL17593693M - OL17677733M - OL17675565M - OL17838070M - OL17805162M - OL17816183M - OL17687463M - OL17700257M - OL107141M - OL17697913M - OL14689139M - OL17794407M - OL17837936M - OL17686300M - OL17703031M - OL1199835M - OL14682405M - OL17790037M - OL6833077M - OL615830M - OL17676819M - OL6834512M - OL17700856M
- Online Computer Library Center (OCLC) ID: ➤ 37308957 - 36000746 - 30760906 - 32949542 - 43919172 - 40697453 - 40737835 - 44431323 - 38526344 - 45422182
- Library of Congress Control Number (LCCN): 94193078 - 99225112 - 96213218 - 00327315 - 00329815
Author's Alternative Names:
"United States. General of Accounting Office.", "U S. General Accounting Office", "United States General Accounting Office ", "General Accounting Office.", "General Accounting Office (U.S.)", "U.S. General Accounting Office.", "United States. General Accounting Office.", "United States General Accounting Office.", "U.S. General Accounting Office", "General Accountability Office (U.S.)" and "United States. General Accounting OFfice.",Access and General Info:
- First Year Published: 1991
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Tax systems modernization at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Network security
By Charlie Kaufman

“Network security” Metadata:
- Title: Network security
- Author: Charlie Kaufman
- Language: English
- Number of Pages: Median: 713
- Publisher: ➤ Prentice Hall PTR - PTR Prentice Hall - Pearson Education, Limited
- Publish Date: ➤ 1995 - 2002 - 2020 - 2021 - 2022
- Publish Location: ➤ Upper Saddle River, NJ - Englewood Cliffs, New Jersey - Upper Saddle River, N.J
“Network security” Subjects and Themes:
- Subjects: ➤ Security measures - Electronic data processing departments - Computer security - Access control - Computers - Computer networks - Algorithms - Engineering - Computers--access control - Electronic data processing departments--security measures - Computer networks--security measures - Information technology--general and others - Qa76.9.a25 k345 1995 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL29470567M - OL3583700M - OL35566367M - OL39949531M - OL35861369M - OL50173792M - OL39958131M - OL873219M
- Online Computer Library Center (OCLC) ID: 50484192 - 32337125 - 297556570
- Library of Congress Control Number (LCCN): 2002281070 - 95159022
- All ISBNs: ➤ 9780130460196 - 0136643612 - 0137156375 - 0130614661 - 0136643604 - 9780136643609 - 0137155883 - 0136643523 - 9780136643616 - 9780130614667 - 9780136643524 - 9780137156375 - 9780137155880 - 013279716X - 0130460192 - 9780132797160
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15Information security
By United States. General Accounting Office
“Information security” Metadata:
- Title: Information security
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 32
- Publisher: ➤ U.S. General Accounting Office - The Office [distributor - United States General Accounting Office - The Office - U.S. GAO
- Publish Date: ➤ 1987 - 1989 - 1990 - 1991 - 1996 - 1998 - 1999 - 2000 - 2001 - 2002 - 2004
- Publish Location: ➤ Washington, DC - Washington, D.C. (P.O. Box 37050, Washington 20013) - Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20877) - Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) - Washington, D.C - Gaithersburg, Md. (P.O. Box 6015, Gaithersburg 20877) - Washington D.C. (P.O. Box 37050, Washington D.C. 20013)
“Information security” Subjects and Themes:
- Subjects: ➤ Access control - Administrative agencies - Agriculture - Armed Forces - Auditing - Automation - B-2 bomber - Classified Defense information - Communication systems - Computer networks - Computer security - Confidential communications - Congresses - Correspondence - Data processing - Data protection - Databases - Disclosure of information - District of Columbia Highway Trust Fund - Electronic filing systems - Electronic government information - Evaluation - Finance - Government communication systems - Information Systems - Information resources management - Information services - Law and legislation - National security - Northrop Corporation - Northrop Corporation. Advanced Systems Division - Official secrets - Officials and employees - Presidents - Public key infrastructure (Computer security) - Research - Roads - Security classification (Government documents) - Security measures - Staff - Tax returns - Telecommunication - United States - United States Dept. of Agriculture - United States. Dept. of Agriculture - United States. Dept. of Defense - United States. Dept. of Energy - United States. Dept. of the Interior - United States. Internal Revenue Service - United States. National Aeronautics and Space Administration - United States. Department of Energy - United States. Department of Defense - Information systems - United States. Department of the Interior - United States Department of Agriculture
- Places: America - United States - Washington (D.C.)
Edition Identifiers:
- The Open Library ID: ➤ OL14537760M - OL3996142M - OL14499506M - OL3350407M - OL571739M - OL15363773M - OL6833632M - OL3995654M - OL3986830M - OL6833902M - OL14530741M - OL14538290M - OL3996134M - OL6833140M - OL100136M - OL17674787M - OL4016390M - OL3995917M - OL17716660M - OL477378M
- Online Computer Library Center (OCLC) ID: 45544837 - 20402263 - 39980899 - 50749371 - 24153147
- Library of Congress Control Number (LCCN): ➤ 2001387097 - 00328711 - 99214381 - 2001337551 - 2001315871 - 00327399 - 00328215 - 2001337869 - 2004368656 - 2001337144 - 2001337881 - 98203144 - 96157993
Author's Alternative Names:
"General Accountability Office (U.S.)", "U.S. General Accounting Office", "U.S. General Accounting Office.", "United States General Accounting Office.", "United States General Accounting Office ", "United States. General Accounting Office.", "United States. General of Accounting Office.", "General Accounting Office.", "General Accounting Office (U.S.)", "United States. General Accounting OFfice." and "U S. General Accounting Office",Access and General Info:
- First Year Published: 1987
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16Metasploit
By David Kennedy

“Metasploit” Metadata:
- Title: Metasploit
- Author: David Kennedy
- Language: English
- Publisher: No Starch Press
- Publish Date: 2011
- Publish Location: San Francisco, Calif
“Metasploit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - COMPUTERS / Internet / Security - Computer networks - Computers - COMPUTERS / Security / General - COMPUTERS / Internet / General - Metasploit (Electronic resource) - Security measures - COMPUTERS / Security / Viruses
Edition Identifiers:
- The Open Library ID: OL24906341M
- Library of Congress Control Number (LCCN): 2011020166
- All ISBNs: 9781593272883 - 159327288X
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Metasploit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17Urban outlaws
By Peter Jay Black

“Urban outlaws” Metadata:
- Title: Urban outlaws
- Author: Peter Jay Black
- Language: English
- Number of Pages: Median: 274
- Publisher: ➤ Bound to Stay Bound Books - Bloomsbury USA Childrens - Bloomsbury Publishing Plc - Bloomsbury Publishing PLC - Bloomsbury Publishing
- Publish Date: 2014
“Urban outlaws” Subjects and Themes:
- Subjects: ➤ Criminals - Ability - Adventure and adventurers - Juvenile fiction - Computers - Fiction - Science fiction - Adventure stories - Orphans - Children's fiction - Mystery and detective stories - Adventure and adventurers, fiction - Orphans, fiction - Robbers and outlaws, fiction - Outlaws - Access control - Spies - JUVENILE FICTION / Action & Adventure / General - JUVENILE FICTION / Science & Technology - JUVENILE FICTION / Law & Crime - Child and youth fiction
Edition Identifiers:
- The Open Library ID: OL34489624M - OL27166040M - OL28282633M - OL53337791M
- Online Computer Library Center (OCLC) ID: 866584094 - 871965542
- Library of Congress Control Number (LCCN): 2014005604
- All ISBNs: ➤ 9781408863503 - 9781619634008 - 1619634007 - 9781619635722 - 9781408851425 - 1408851423 - 1408851415 - 9798855012811 - 1619635720 - 9781408851418 - 1408863502
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Urban outlaws at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Handbook of applied cryptography
By Alfred J. Menezes

“Handbook of applied cryptography” Metadata:
- Title: ➤ Handbook of applied cryptography
- Author: Alfred J. Menezes
- Language: English
- Number of Pages: Median: 810
- Publisher: ➤ Taylor & Francis Group - CRC Press
- Publish Date: 1996 - 1997 - 2018
- Publish Location: Boca Raton
“Handbook of applied cryptography” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Cryptography - Handbooks, manuals - Ordinateurs - Guides, manuels - Accès - Contrôle - Cryptographie - Security - Computers--access control--handbooks, manuals, etc - Cryptography--handbooks, manuals, etc - Qa76.9.a25 m463 1997 - 005.8/2 - Long Now Manual for Civilization
Edition Identifiers:
- The Open Library ID: ➤ OL33768204M - OL33752303M - OL33736419M - OL33634667M - OL33437992M - OL989328M
- Online Computer Library Center (OCLC) ID: 35292671 - 54016134
- Library of Congress Control Number (LCCN): 96027609
- All ISBNs: ➤ 0429881320 - 9780429466335 - 0849385237 - 9780429881305 - 9780429881312 - 9781439821916 - 9780429881329 - 0429881304 - 0429881312 - 0429466331 - 1439821917 - 9780849385230
Access and General Info:
- First Year Published: 1996
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Handbook of applied cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Nuclear security
By United States. General Accounting Office
“Nuclear security” Metadata:
- Title: Nuclear security
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 18
- Publisher: ➤ The Office [distributor - The Office - U.S. General Accounting Office
- Publish Date: ➤ 1988 - 1991 - 1992 - 1993 - 2000 - 2002 - 2003 - 2004
- Publish Location: ➤ Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20884-6015) - Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) - Washington, D.C - Washington, D.C. (P.O. Box 37050, Washington 20013)
“Nuclear security” Subjects and Themes:
- Subjects: ➤ Access control - American Nuclear weapons information - Auditing - Evaluation - Government property - Laboratories - Lawrence Livermore National Laboratory - Materials - Nuclear energy - Nuclear engineering - Nuclear facilities - Nuclear industry - Nuclear weapons - Nuclear weapons plants - Officials and employees - Research - Rules and practice - Safety measures - Security classification (Government documents) - Security clearances - Security measures - Security systems - United States - United States. Dept. of Energy - United States. National Nuclear Security Administration - United States. Department of Energy - Nuclear Weapons - Security Systems
- Places: California - Livermore - United States
Edition Identifiers:
- The Open Library ID: ➤ OL15397923M - OL17739655M - OL14541402M - OL16267298M - OL14541547M - OL3350547M - OL14542475M - OL17748999M - OL3764435M - OL14530753M - OL14541370M - OL17739659M - OL17739648M - OL17659923M - OL6832217M
- Online Computer Library Center (OCLC) ID: ➤ 26372268 - 50612546 - 31732907 - 27392874 - 25313336 - 55071610 - 24481102
- Library of Congress Control Number (LCCN): 00325960 - 2003479238 - 2004368921 - 2002418569
Author's Alternative Names:
"General Accountability Office (U.S.)", "U.S. General Accounting Office", "U.S. General Accounting Office.", "United States General Accounting Office.", "United States General Accounting Office ", "United States. General Accounting Office.", "United States. General of Accounting Office.", "General Accounting Office.", "General Accounting Office (U.S.)", "United States. General Accounting OFfice." and "U S. General Accounting Office",Access and General Info:
- First Year Published: 1988
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Nuclear security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20School law and the public schools
By Nathan L. Essex

“School law and the public schools” Metadata:
- Title: ➤ School law and the public schools
- Author: Nathan L. Essex
- Language: English
- Number of Pages: Median: 384
- Publisher: ➤ HYESHOM - Pearson - Allyn and Bacon - Tandem Library - Pearson/A and B - Allyn & Bacon - Pearson Education, Limited - Pearson/Allyn and Bacon
- Publish Date: ➤ 1920 - 1999 - 2001 - 2002 - 2004 - 2005 - 2007 - 2008 - 2012 - 2015
- Publish Location: Boston
“School law and the public schools” Subjects and Themes:
- Subjects: ➤ Education_Law - Law and legislation - School management and organization - Educational law and legislation - Droit - Education - Administration scolaire - Éducation - Educational law and legislation, united states - Student records - School management and organization, law and legislation - Access control - Education_law
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL9435568M - OL377352M - OL28175707M - OL29401457M - OL9720808M - OL7412113M - OL7411527M - OL3942575M - OL21055656M - OL29130263M - OL3303033M
- Online Computer Library Center (OCLC) ID: 39633854 - 54454662 - 45951638
- Library of Congress Control Number (LCCN): 98039353 - 2006051821 - 2004043738 - 2001022230 - 2014024890
- All ISBNs: ➤ 0133022382 - 020541205X - 9780205332489 - 9780133022384 - 9780135196748 - 9780613923811 - 0205273599 - 0205508162 - 9780133905427 - 9780205273591 - 013390542X - 0135196744 - 9780205412051 - 020533248X - 9780205508167 - 0613923812
Access and General Info:
- First Year Published: 1920
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find School law and the public schools at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Guide to computer network security
By Joseph Migga Kizza

“Guide to computer network security” Metadata:
- Title: ➤ Guide to computer network security
- Author: Joseph Migga Kizza
- Language: English
- Number of Pages: Median: 548
- Publisher: ➤ Springer - Springer International Publishing AG
- Publish Date: ➤ 2009 - 2013 - 2015 - 2017 - 2018 - 2020 - 2024 - 2025
“Guide to computer network security” Subjects and Themes:
- Subjects: Computer networks - Security measures - Access control - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL27982675M - OL28182862M - OL34569230M - OL37104048M - OL43207044M - OL35848001M - OL50637348M - OL27179429M - OL57748209M
- Online Computer Library Center (OCLC) ID: 898418431
- All ISBNs: ➤ 3030381404 - 9781447145448 - 1447166531 - 9783030381400 - 9783031475481 - 9781447166535 - 3319857061 - 3319556053 - 9781848009172 - 1447145445 - 9783319857060 - 9781447145424 - 1848009178 - 3031475488 - 9783319556055 - 1447145429 - 303147743X - 9783031477430
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Guide to computer network security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22The red web
By Andreĭ Soldatov and Irina Borogan

“The red web” Metadata:
- Title: The red web
- Authors: Andreĭ SoldatovIrina Borogan
- Language: English
- Number of Pages: Median: 370
- Publisher: PublicAffairs
- Publish Date: 2015
“The red web” Subjects and Themes:
- Subjects: ➤ Politics and government - Electronic surveillance - Access control - Information society - Freedom of information - Internet - Internet, political aspects - Russia (federation), politics and government - Political aspects
- Places: Russia (Federation)
- Time: 1991-
Edition Identifiers:
- The Open Library ID: OL34883642M - OL27190199M
- Online Computer Library Center (OCLC) ID: 914136614
- Library of Congress Control Number (LCCN): 2015015850
- All ISBNs: ➤ 1610395743 - 9781610395731 - 9781610399579 - 1610395735 - 9781610395748 - 1610399579
Author's Alternative Names:
"Andrei Soldatov", "Andreĭ Soldatov" and "Andrei Alekseyevich Soldatov"Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The red web at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Access control, authentication, and public key infrastructure
By Bill Ballad

“Access control, authentication, and public key infrastructure” Metadata:
- Title: ➤ Access control, authentication, and public key infrastructure
- Author: Bill Ballad
- Language: English
- Number of Pages: Median: 400
- Publisher: ➤ Jones & Bartlett Learning, LLC - Jones & Bartlett Learning
- Publish Date: 2011 - 2013
- Publish Location: Sudbury, MA
“Access control, authentication, and public key infrastructure” Subjects and Themes:
- Subjects: ➤ Public key cryptography - Computers - Access control - Authentication - Computer security - Computer networks, security measures - Computers, access control - Cryptography
Edition Identifiers:
- The Open Library ID: OL25047332M - OL28512974M - OL29698839M
- Online Computer Library Center (OCLC) ID: 702369403 - 650217951
- Library of Congress Control Number (LCCN): 2011282487 - 2013372266
- All ISBNs: ➤ 1284031594 - 0763791288 - 9781284031591 - 1284031608 - 9781284031607 - 9780763791285
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Access control, authentication, and public key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24The seventh sense
By Joshua Cooper Ramo

“The seventh sense” Metadata:
- Title: The seventh sense
- Author: Joshua Cooper Ramo
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Back Bay Books, Incorporated - Little Brown & Company - Little, Brown & Company
- Publish Date: 2016 - 2017 - 2018
“The seventh sense” Subjects and Themes:
- Subjects: ➤ Information society - Internet - Information technology - Access control - Strategic planning - Business planning - Internet, social aspects - nyt:advice-how-to-and-miscellaneous=2016-06-05 - New York Times bestseller
Edition Identifiers:
- The Open Library ID: OL29727891M - OL27213538M - OL29328287M - OL34621486M - OL27438331M
- Online Computer Library Center (OCLC) ID: 948762914
- Library of Congress Control Number (LCCN): 2015960065
- All ISBNs: ➤ 1478909102 - 0316285072 - 9780316285049 - 9780316395052 - 0316395056 - 0316285064 - 9780316285063 - 9781478909101 - 9780316285070 - 0316285048
Access and General Info:
- First Year Published: 2016
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The seventh sense at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Security protocols
By Bruce Christianson, Bruno Crispo, James A. Malcolm and Michael Roe

“Security protocols” Metadata:
- Title: Security protocols
- Authors: Bruce ChristiansonBruno CrispoJames A. MalcolmMichael Roe
- Language: English
- Number of Pages: Median: 325
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: ➤ 2003 - 2005 - 2006 - 2007 - 2009 - 2013
“Security protocols” Subjects and Themes:
- Subjects: ➤ Cryptographie - Cryptography - Congrès - Contrôle - Congresses - Accès - Computer security - Ordinateurs - Sécurité informatique - Computers, access control - Computers - Access control
Edition Identifiers:
- The Open Library ID: ➤ OL37229026M - OL37140924M - OL35787219M - OL35781654M - OL35776192M - OL35758120M - OL34472497M - OL34472449M - OL34456964M - OL34456818M - OL9057060M
- Online Computer Library Center (OCLC) ID: 506115933
- Library of Congress Control Number (LCCN): 2006932036
- All ISBNs: ➤ 3540398716 - 3540455701 - 3540318364 - 9783540458074 - 3642049044 - 9783540409267 - 3540448101 - 9783642417177 - 354049135X - 3642417175 - 3540458077 - 9783642049040 - 9783540448105 - 3540409254 - 3540771565 - 9783540771562 - 3540409262 - 9783540455707 - 9783540409250 - 9783540318361 - 9783540398714 - 9783540491354
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security protocols at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26Secure data management
By Willem Jonker and Milan Petkovic

“Secure data management” Metadata:
- Title: Secure data management
- Authors: Willem JonkerMilan Petkovic
- Language: English
- Number of Pages: Median: 177
- Publisher: ➤ Springer - Springer London, Limited - Springer International Publishing AG
- Publish Date: ➤ 2004 - 2005 - 2006 - 2007 - 2009 - 2010 - 2012 - 2014
“Secure data management” Subjects and Themes:
- Subjects: ➤ Database security - Computers - Congresses - Access control - Database management - Computer security - Information Systems Applications (incl. Internet) - Computer science - Data encryption (Computer science) - Data protection - Systems and Data Security - Computers and Society - Data Encryption
Edition Identifiers:
- The Open Library ID: ➤ OL37229200M - OL37140922M - OL37140685M - OL37122168M - OL37121881M - OL37121706M - OL37111598M - OL34501369M - OL34374863M - OL9056855M
- Online Computer Library Center (OCLC) ID: 71298972
- Library of Congress Control Number (LCCN): 2006931629
- All ISBNs: ➤ 3540389873 - 9783540300731 - 9783540319740 - 9783319068114 - 9783540389842 - 3540319743 - 3540389849 - 9783319068107 - 3642328725 - 354075248X - 3319068105 - 3642155464 - 3319068113 - 9783540752486 - 9783642328725 - 9783642042195 - 9783540389873 - 3642042198 - 9783642155468 - 3540300732
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Secure data management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Various bills and resolutions
By United States. Congress. House. Committee on Foreign Affairs
“Various bills and resolutions” Metadata:
- Title: Various bills and resolutions
- Author: ➤ United States. Congress. House. Committee on Foreign Affairs
- Language: English
- Number of Pages: Median: 183
- Publisher: ➤ For sale by the Supt. of Docs., U.S. G.P.O. - U.S. G.P.O.
- Publish Date: 2007 - 2008
- Publish Location: Washington
“Various bills and resolutions” Subjects and Themes:
- Subjects: ➤ Peacekeeping forces - Arab-Israeli conflict - International cooperation - American Food relief - Foreign study - Peace - American Economic sanctions - Relations - Crime - Anti-Jewish propaganda - Internet - Services for - Overseas Private Investment Corporation - Emergency communication systems - American Humanitarian assistance - Victims of state-sponsored terrorism - Comfort women - Food relief, American - Democracy - Law and legislation - Peace-building - Democratization - United Nations - Humanitarian assistance - Foreign relations - Economic sanctions, American - Appropriations and expenditures - Officials and employees - Wildlife diseases - Anniversaries - Slavery - American National Red Cross - Humanitarian assistance, American - Salaries - American Economic assistance - Export controls - Arms transfers - Claims - Christianity - Refugees - Prevention - Finance - Human rights - Nuclear nonproliferation - Jews - Government policy - Access control - Diplomatic and consular service, American - Economic assistance, American - Forced labor - Ethnic relations - Archival resources - Race discrimination - American Diplomatic and consular service - Holocaust, Jewish (1939-1945) - Ḥarakat al-Muqāwamah al-Islāmīyah - Terrorism victims' families - Islam - Tuberculosis - Poverty
- Places: ➤ Afghanistan - Asia - Burma - Caribbean Area - Chad - Cyprus - Darfur - Developing countries - Europe - Iran - Iraq - Israel - Korea (North) - Middle East - Sudan - Uganda - United States
Edition Identifiers:
- The Open Library ID: ➤ OL22985630M - OL16931002M - OL23112981M - OL22698167M - OL16824459M - OL23112959M - OL23113134M - OL14561194M - OL16824469M - OL14564676M - OL14565624M
- Online Computer Library Center (OCLC) ID: ➤ 154224874 - 271513869 - 219736690 - 182621946 - 179923711 - 271655416 - 217262595 - 219740205 - 228145808 - 271513845
- Library of Congress Control Number (LCCN): ➤ 2008397739 - 2008377340 - 2008377153 - 2007473831 - 2007473244 - 2008377156 - 2007406288 - 2009366091
- All ISBNs: ➤ 9780160801440 - 9780160776151 - 9780160819520 - 0160795273 - 0160776155 - 9780160808906 - 9780160794100 - 016081930X - 0160794102 - 0160799813 - 9780160795275 - 0160818281 - 9780160789052 - 0160789052 - 9780160799815 - 0160801443 - 0160819520 - 9780160818288 - 9780160819308 - 0160808901
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Various bills and resolutions at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Cyber within
By Marcos Christodonte

“Cyber within” Metadata:
- Title: Cyber within
- Author: Marcos Christodonte
- Language: English
- Number of Pages: Median: 60
- Publisher: Proactive Assurance, LLC
- Publish Date: 2010
- Publish Location: [Chesapeake, VA]
“Cyber within” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer crimes - Prevention - Computer security - Computers - Access control - Data protection - Business intelligence
Edition Identifiers:
- The Open Library ID: OL37076168M
- Online Computer Library Center (OCLC) ID: 844193828
- All ISBNs: 0615330150 - 9780615330150
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber within at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Penetration tester's open source toolkit
By Jeremy Faircloth

“Penetration tester's open source toolkit” Metadata:
- Title: ➤ Penetration tester's open source toolkit
- Author: Jeremy Faircloth
- Language: English
- Number of Pages: Median: 458
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2006 - 2007 - 2011 - 2016
- Publish Location: Waltham, MA
“Penetration tester's open source toolkit” Subjects and Themes:
- Subjects: ➤ Penetration testing (Computer security) - Testing - Access control - Computer networks - Computers - Security measures - Computers, access control - Computer security - Computer networks, security measures - Open source software
Edition Identifiers:
- The Open Library ID: ➤ OL35770090M - OL35755261M - OL28579982M - OL35770487M - OL24886177M - OL34507910M
- Online Computer Library Center (OCLC) ID: 733546833 - 761694692
- Library of Congress Control Number (LCCN): 2011025807
- All ISBNs: ➤ 9780080556079 - 1597496286 - 1597496278 - 9780080489520 - 0128023538 - 0080489524 - 9780128023532 - 0080556078 - 9780128021491 - 9781597496278 - 9781597496285 - 0128021497
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Penetration tester's open source toolkit at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Information security
By United States. General Accounting Office. Accounting and Information Management Division
“Information security” Metadata:
- Title: Information security
- Author: ➤ United States. General Accounting Office. Accounting and Information Management Division
- Language: English
- Number of Pages: Median: 16
- Publisher: The Office
- Publish Date: 1999 - 2000
- Publish Location: ➤ Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) - Washington, D.C. (P.O. Box 37050, Washington 20013)
“Information security” Subjects and Themes:
- Subjects: ➤ Access control - Administrative agencies - Computer security - Computer viruses - Computers - Data processing - Data protection - Evaluation - Information resources management - Records and correspondence - Security measures - Software maintenance - United States - United States. Dept. of Health and Human Services - United States. Dept. of Housing and Urban Development - United States. Dept. of the Interior - United States. Dept. of the Treasury - United States. National Aeronautics and Space Administration - United States. Office of Personnel Management - United States. Social Security Administration
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL15319397M - OL15305962M - OL15319395M - OL15337980M - OL15319401M - OL15319392M - OL15311857M - OL15321062M - OL15311843M - OL15300643M
Author's Alternative Names:
"United States. General Accounting Office. Accounting and Information Management Division."Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31Deep state
By Marc Ambinder

“Deep state” Metadata:
- Title: Deep state
- Author: Marc Ambinder
- Language: English
- Number of Pages: Median: 323
- Publisher: ➤ Wiley & Sons Canada, Limited, John - Wiley & Sons, Incorporated, John
- Publish Date: 2013
“Deep state” Subjects and Themes:
- Subjects: Official secrets - Government information - National security - Access control - National security, united states
- Places: United States
Edition Identifiers:
- The Open Library ID: OL39986505M - OL39892380M - OL39993646M - OL27172356M - OL39992258M
- Online Computer Library Center (OCLC) ID: 824725673
- All ISBNs: ➤ 9781118225806 - 1118225805 - 129924260X - 9781299242609 - 9781118146682 - 1118235738 - 9781118263785 - 1118146689 - 9781118235737 - 1118263782
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Deep state at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32The hacker's handbook
By Hugo Cornwall
“The hacker's handbook” Metadata:
- Title: The hacker's handbook
- Author: Hugo Cornwall
- Language: English
- Number of Pages: Median: 159
- Publisher: ➤ E.A. Brown Co. - Century Communications
- Publish Date: 1985 - 1986
- Publish Location: Alexandria, Minn - London
“The hacker's handbook” Subjects and Themes:
- Subjects: ➤ Access control - Computer hackers - Computer networks - Computers - Data transmission systems - Handbooks, manuals - Modems - Hackers
Edition Identifiers:
- The Open Library ID: OL15157057M - OL2304079M - OL15157083M
- Library of Congress Control Number (LCCN): 86178758
- All ISBNs: ➤ 0712606939 - 0712606505 - 9780712606509 - 9780912579061 - 9780712606936 - 0912579064
Access and General Info:
- First Year Published: 1985
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find The hacker's handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33The most dangerous man in the world
By Andrew Fowler

“The most dangerous man in the world” Metadata:
- Title: ➤ The most dangerous man in the world
- Author: Andrew Fowler
- Language: English
- Number of Pages: Median: 271
- Publisher: ➤ Skyhorse - Skyhorse Publishing - Skyhorse Publishing Company, Incorporated - Melbourne University Publishing
- Publish Date: 2011 - 2012 - 2013
- Publish Location: New York
“The most dangerous man in the world” Subjects and Themes:
- Subjects: ➤ Government information - WikiLeaks (Organization) - Hackers - Access control - Leaks (Disclosure of information) - Web sites - Classified Defense information - Official secrets - Whistle blowing - Political aspects - Security classification (Government documents) - Biography - Internet - Editors - Political activists - Assange, julian, 1971- - Australia, biography - Journalists, biography - Computer hackers
- People: Julian Assange (1971-)
- Places: United States
Edition Identifiers:
- The Open Library ID: OL28482066M - OL37401315M - OL30660969M - OL51948283M - OL26619213M
- Online Computer Library Center (OCLC) ID: 706021712
- Library of Congress Control Number (LCCN): 2012518667 - 2012038871
- All ISBNs: ➤ 9781616084899 - 1626367914 - 1620871947 - 9781102797661 - 1102797669 - 9781626367913 - 1616084898 - 9781620871942 - 9780522861907 - 0522861903
Access and General Info:
- First Year Published: 2011
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The most dangerous man in the world at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34The Digital Person
By Daniel J. Solove

“The Digital Person” Metadata:
- Title: The Digital Person
- Author: Daniel J. Solove
- Language: English
- Number of Pages: Median: 283
- Publisher: ➤ NYU Press - New York University Press
- Publish Date: 2004 - 2006
- Publish Location: New York
“The Digital Person” Subjects and Themes:
- Subjects: ➤ Government information - Electronic records - Access control - Law and legislation - Right of Privacy - Data protection - Public records - Privacy, right of - Law, united states - Protection de l'information (Informatique) - Droit - Archives électroniques - Accès - Contrôle - Archives publiques - Information sur l'État - Droit à la vie privée - LAW - Constitutional - Public - Datennetz - Datenschutz - Elektronische Medien - Internet - Personenbezogene Daten - Privatsphäre
Edition Identifiers:
- The Open Library ID: OL49753114M - OL33977829M - OL25887742M - OL8045240M - OL8046252M
- Online Computer Library Center (OCLC) ID: 55077622 - 182530564
- Library of Congress Control Number (LCCN): 2004010188
- All ISBNs: ➤ 9780814708965 - 0814741185 - 9780814740378 - 0814740375 - 9780814741184 - 0814798462 - 081470896X - 9780814798461
Author's Alternative Names:
"SOLOVE", "Solove", "Shalefu (Solove, Daniel J.)" and "Daniel Solove"Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Digital Person at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Access denied
By Ronald Deibert

“Access denied” Metadata:
- Title: Access denied
- Author: Ronald Deibert
- Language: English
- Number of Pages: Median: 472
- Publisher: MIT Press - The MIT Press
- Publish Date: 2008 - 2018
- Publish Location: Cambridge, MA
“Access denied” Subjects and Themes:
- Subjects: ➤ Access control - Computers - Government policy - Censorship - Internet - Censur - Medienfreiheit - Informationspolitik - Filtering (signalen) - 05.39 mass communication and mass media: other - Zensur - Censuur - Overheidsbeleid - 05.38 content aspects of electronic communication - Regierung - Networking - General - Security - Impact of science & technology on society - Regional government policies - Computers, access control - Internet, government policy
Edition Identifiers:
- The Open Library ID: ➤ OL17179788M - OL10238053M - OL29023410M - OL29706852M - OL29754011M - OL10236924M
- Online Computer Library Center (OCLC) ID: 85851590
- Library of Congress Control Number (LCCN): 2007010334
- All ISBNs: ➤ 9780262255998 - 9780262042451 - 0262541963 - 0262255995 - 9780262251440 - 0262290723 - 9780262541961 - 0262042452 - 9780262290722 - 0262251442
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Access denied at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Web Penetration Testing with Kali Linux
By Joseph Muniz and Aamir Lakhani

“Web Penetration Testing with Kali Linux” Metadata:
- Title: ➤ Web Penetration Testing with Kali Linux
- Authors: Joseph MunizAamir Lakhani
- Language: English
- Number of Pages: Median: 342
- Publisher: ➤ CreateSpace Independent Publishing Platform - Packt Publishing, Limited - Packt Publishing
- Publish Date: 2013 - 2015
“Web Penetration Testing with Kali Linux” Subjects and Themes:
- Subjects: ➤ Linux (computer operating system) - Computer networks, security measures - Computer security - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL55238400M - OL39589812M - OL26838075M
- Online Computer Library Center (OCLC) ID: 865075658
- All ISBNs: ➤ 1514272385 - 9781782163176 - 1782163166 - 1782163174 - 9781782163169 - 9781514272381
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Web Penetration Testing with Kali Linux at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Data Privacy for the Smart Grid
By Rebecca Herold and Christine Hertzog
“Data Privacy for the Smart Grid” Metadata:
- Title: ➤ Data Privacy for the Smart Grid
- Authors: Rebecca HeroldChristine Hertzog
- Language: English
- Number of Pages: Median: 250
- Publisher: ➤ CRC Press, Taylor & Francis Group - Auerbach Publishers, Incorporated - Taylor & Francis Group - Taylor & Francis
- Publish Date: 2015 - 2019
- Publish Location: Boca Raton
“Data Privacy for the Smart Grid” Subjects and Themes:
- Subjects: ➤ Public utilities - Consumer protection - Privacy, right of - Records - Information technology: general issues - Management & management techniques - Computer security - Smart power grids - Security measures - Right of Privacy - Access control - Réseaux électriques intelligents - Sécurité - Mesures - Services publics - Consommateurs - Protection - Archives - Accès - Contrôle - COMPUTERS - Security - General - Information Technology - BUSINESS & ECONOMICS - Management - Infrastructure - SOCIAL SCIENCE
Edition Identifiers:
- The Open Library ID: ➤ OL31373640M - OL31036684M - OL33490385M - OL29277289M - OL29529721M - OL29530623M - OL37980806M - OL33696341M
- Online Computer Library Center (OCLC) ID: 902675850
- Library of Congress Control Number (LCCN): 2014030904
- All ISBNs: ➤ 1466573384 - 0429190204 - 0367377829 - 9781000219005 - 1000219003 - 9781000219487 - 9781466573376 - 1466573376 - 1322668116 - 9781322668116 - 9780429190209 - 9781466573383 - 9780367377823 - 1000219488 - 18005
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Data Privacy for the Smart Grid at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Transparansi dan keterbukaan informasi publik
By Indonesia. Departemen Komunikasi dan Informatika
“Transparansi dan keterbukaan informasi publik” Metadata:
- Title: ➤ Transparansi dan keterbukaan informasi publik
- Author: ➤ Indonesia. Departemen Komunikasi dan Informatika
- Language: ind
- Number of Pages: Median: 98
- Publisher: ➤ Departemen Komunikasi dan Informatika, Republik Indonesia
- Publish Date: 2008
- Publish Location: [Jakarta]
“Transparansi dan keterbukaan informasi publik” Subjects and Themes:
- Subjects: Freedom of information - Public records - Access control
Edition Identifiers:
- The Open Library ID: OL23206918M
- Library of Congress Control Number (LCCN): 2008450608
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Transparansi dan keterbukaan informasi publik at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Collaborative access to virtual museum collection information
By Bernadette G. Callery

“Collaborative access to virtual museum collection information” Metadata:
- Title: ➤ Collaborative access to virtual museum collection information
- Author: Bernadette G. Callery
- Language: English
- Number of Pages: Median: 142
- Publisher: ➤ Taylor & Francis Group - Haworth Information Press - Routledge
- Publish Date: 2004 - 2005 - 2013
- Publish Location: Binghamton, NY
“Collaborative access to virtual museum collection information” Subjects and Themes:
- Subjects: ➤ Collection management - Museums - Virtual museums - Access control - Digital communications - Electronic information resources - Museums, management - Musées virtuels - Transmission numérique - Musées - Gestion des collections - Sources d'information électroniques - Accès - Contrôle - BUSINESS & ECONOMICS - Museum Administration & Museology - REFERENCE - General - TRAVEL - Museums, Tours, Points of Interest
Edition Identifiers:
- The Open Library ID: ➤ OL54055182M - OL37293190M - OL3392367M - OL37291941M - OL33412409M - OL54030266M - OL46015688M
- Online Computer Library Center (OCLC) ID: 57579261 - 846494971
- Library of Congress Control Number (LCCN): 2005001501
- All ISBNs: ➤ 0789029332 - 9781299626164 - 9780789029331 - 1136797092 - 1136797106 - 113679705X - 9780203826850 - 0789029340 - 9781136797095 - 9780789029348 - 9780429238864 - 020382685X - 1299626165 - 9781136797057 - 9781136797101 - 042923886X
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Collaborative access to virtual museum collection information at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Managing Risk in Information Systems
By Joanna Lyn Grama and Darril Gibson
“Managing Risk in Information Systems” Metadata:
- Title: ➤ Managing Risk in Information Systems
- Authors: Joanna Lyn GramaDarril Gibson
- Language: English
- Number of Pages: Median: 456
- Publisher: Jones & Bartlett Learning, LLC
- Publish Date: 2014 - 2020
“Managing Risk in Information Systems” Subjects and Themes:
- Subjects: ➤ Information storage and retrieval systems - Data protection - Computer security - Electronic information resources - Access control - Mathematics - Electronic information resources--access control - Qa76.9.a25
Edition Identifiers:
- The Open Library ID: OL28547341M - OL29698794M - OL28547350M - OL29882260M
- Library of Congress Control Number (LCCN): 2015410274
- All ISBNs: ➤ 9781284058680 - 1284055957 - 9781284183719 - 1284183718 - 1284055965 - 1284058689 - 9781284055962 - 9781284055955
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Managing Risk in Information Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Information security
By United States. General Accounting Office. Accounting and Information Management Division
“Information security” Metadata:
- Title: Information security
- Author: ➤ United States. General Accounting Office. Accounting and Information Management Division
- Language: English
- Number of Pages: Median: 16
- Publisher: The Division - The Office
- Publish Date: 1999 - 2000
- Publish Location: ➤ Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013)
“Information security” Subjects and Themes:
- Subjects: ➤ Computer security - Security measures - Evaluation - Data protection - Data processing - Software maintenance - Administrative agencies - Access control - Computer networks - Computers - Management - United States - U.S. Nuclear Regulatory Commission - United States. Social Security Administration - United States. Dept. of Commerce
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL15562368M - OL17602665M - OL17703578M - OL17594977M - OL15562369M - OL17717018M - OL17593692M - OL17602729M
- Online Computer Library Center (OCLC) ID: 43846076 - 44580087 - 44270169 - 44580342
Author's Alternative Names:
"United States. General Accounting Office. Accounting and Information Management Division."Access and General Info:
- First Year Published: 1999
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42Linux Firewalls
By Michael Rash

“Linux Firewalls” Metadata:
- Title: Linux Firewalls
- Author: Michael Rash
- Language: English
- Number of Pages: Median: 352
- Publisher: No Starch Press
- Publish Date: 2007
“Linux Firewalls” Subjects and Themes:
- Subjects: Linux - Computers - Firewalls (Computer security) - Access control - Computer security
Edition Identifiers:
- The Open Library ID: OL8871434M
- Online Computer Library Center (OCLC) ID: 71004243 - 192096519
- Library of Congress Control Number (LCCN): 2006026679
- All ISBNs: 1593271417 - 9781593271411
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Linux Firewalls at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Security in computing
By Charles P. Pfleeger

“Security in computing” Metadata:
- Title: Security in computing
- Author: Charles P. Pfleeger
- Language: English
- Number of Pages: Median: 556
- Publisher: ➤ Prentice-Hall - Prentice Hall PTR
- Publish Date: 1989 - 1997
- Publish Location: ➤ Upper Saddle River, NJ - Englewood Cliffs, N.J
“Security in computing” Subjects and Themes:
- Subjects: ➤ Privacy, Right of - Data protection - Computer security - Right of Privacy - Computers - Access control
Edition Identifiers:
- The Open Library ID: OL994356M - OL2036241M
- Online Computer Library Center (OCLC) ID: 17806856
- Library of Congress Control Number (LCCN): 96032910 - 88012411
- All ISBNs: 0137989431 - 0133374866 - 9780137989430 - 9780133374865
Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Security in computing at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Computer security
By United States. General Accounting Office
“Computer security” Metadata:
- Title: Computer security
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 24
- Publisher: ➤ The Office [distributor - The Office - GAO - U.S. General Accounting Office
- Publish Date: ➤ 1989 - 1990 - 1992 - 1999 - 2000
- Publish Location: ➤ Gaithersburg, MD (P.O. Box 6015, Gaithersburg 20884-6015) - Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) - Washington, D.C
“Computer security” Subjects and Themes:
- Subjects: ➤ Evaluation - Computer security - Security measures - United States - Access control - Computers - United States. Federal Aviation Administration - Administrative agencies - Data processing - United States. Drug Enforcement Administration - Security classification (Government documents) - National security - Year 2000 date conversion (Computer systems) - Software maintenance - Computer networks - Auditing - Computer viruses - Alien labor - Air traffic control - Foreign workers - Public records - Telecommunication
- Places: United States - Security measures
Edition Identifiers:
- The Open Library ID: ➤ OL1813202M - OL14538006M - OL6833078M - OL14685454M - OL17660786M - OL6831561M - OL14680475M
- Online Computer Library Center (OCLC) ID: 21893788 - 43379414
- Library of Congress Control Number (LCCN): 00325065 - 89602827 - 00327316
Author's Alternative Names:
"General Accountability Office (U.S.)", "U.S. General Accounting Office", "U.S. General Accounting Office.", "United States General Accounting Office.", "United States General Accounting Office ", "United States. General Accounting Office.", "United States. General of Accounting Office.", "General Accounting Office.", "General Accounting Office (U.S.)", "United States. General Accounting OFfice." and "U S. General Accounting Office",Access and General Info:
- First Year Published: 1989
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Computer security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Electronic government
By United States. General Accounting Office
“Electronic government” Metadata:
- Title: Electronic government
- Author: ➤ United States. General Accounting Office
- Language: English
- Number of Pages: Median: 47
- Publisher: ➤ The Office - U.S. General Accounting Office
- Publish Date: 2000 - 2001 - 2002 - 2003
- Publish Location: ➤ Washington, D.C - Washington, D.C. (P.O. Box 37050, Washington 20013)
“Electronic government” Subjects and Themes:
- Subjects: ➤ Electronic government information - Security measures - Internet in public administration - Government paperwork - Electronic public records - United States - Computer networks - Smart cards - United States. General Services Administration - Administrative agencies - Computers - United States. Office of Management and Budget - XML (Document markup language) - Public buildings - Evaluation - Public records - Access control - Case studies - Computer security
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL3625510M - OL3749037M - OL3746054M - OL3727273M - OL6834191M - OL17722391M - OL3998066M
- Online Computer Library Center (OCLC) ID: ➤ 51832454 - 45544801 - 53948655 - 49665162 - 48165700 - 51634287
- Library of Congress Control Number (LCCN): ➤ 2001344452 - 2003426049 - 00329257 - 2003373590 - 2003431318 - 2002410676
Author's Alternative Names:
"General Accountability Office (U.S.)", "U.S. General Accounting Office", "U.S. General Accounting Office.", "United States General Accounting Office.", "United States General Accounting Office ", "United States. General Accounting Office.", "United States. General of Accounting Office.", "General Accounting Office.", "General Accounting Office (U.S.)", "United States. General Accounting OFfice." and "U S. General Accounting Office",Access and General Info:
- First Year Published: 2000
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Electronic government at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Information security policy development for compliance
By Barry L. Williams
“Information security policy development for compliance” Metadata:
- Title: ➤ Information security policy development for compliance
- Author: Barry L. Williams
- Language: English
- Number of Pages: Median: 152
- Publisher: ➤ Auerbach Publishers, Incorporated - Taylor & Francis Group - CRC Press, Taylor & Francis Group
- Publish Date: 2013 - 2016
- Publish Location: Boca Raton, FL
“Information security policy development for compliance” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Computer security - Data protection - Access control - Computer networks, security measures - Computer Security - Sécurité informatique - Réseaux d'ordinateurs - Sécurité - Mesures - Protection de l'information (Informatique) - COMPUTERS - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: OL30661763M - OL36253764M - OL36212435M - OL33521697M - OL34485367M
- Online Computer Library Center (OCLC) ID: 843642725
- Library of Congress Control Number (LCCN): 2012042439
- All ISBNs: ➤ 9780429166402 - 1299709095 - 1466580585 - 0429166400 - 1466580593 - 9781466580596 - 1482209632 - 9781299709096 - 9781466580589 - 9781482209631
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Information security policy development for compliance at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47Chihō kōkyō dantai ni kakawaru ofisu inobēshon (jimu kaikaku) no suishin no gutaiteki na arikata ni tsuite no chōsa kenkyū hōkokusho
By Chihō Jichi Jōhō Sentā (Japan)
“Chihō kōkyō dantai ni kakawaru ofisu inobēshon (jimu kaikaku) no suishin no gutaiteki na arikata ni tsuite no chōsa kenkyū hōkokusho” Metadata:
- Title: ➤ Chihō kōkyō dantai ni kakawaru ofisu inobēshon (jimu kaikaku) no suishin no gutaiteki na arikata ni tsuite no chōsa kenkyū hōkokusho
- Author: Chihō Jichi Jōhō Sentā (Japan)
- Language: jpn
- Number of Pages: Median: 240
- Publisher: Chihō Jichi Jōhō Sentā
- Publish Date: ➤ 1986 - 1987 - 1988 - 1989 - 1990
- Publish Location: [Tokyo]
“Chihō kōkyō dantai ni kakawaru ofisu inobēshon (jimu kaikaku) no suishin no gutaiteki na arikata ni tsuite no chōsa kenkyū hōkokusho” Subjects and Themes:
- Subjects: ➤ Local government - Data processing - Office practice in government - Automation - Public records - Access control
- Places: Japan
Edition Identifiers:
- The Open Library ID: ➤ OL30925880M - OL30953424M - OL30988427M - OL30916718M - OL30897511M - OL30897399M - OL30926123M
- Library of Congress Control Number (LCCN): ➤ 88118116 - 90206372 - 87170417 - 90143887 - 87170926 - 89126446 - 89124054
Access and General Info:
- First Year Published: 1986
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Chihō kōkyō dantai ni kakawaru ofisu inobēshon (jimu kaikaku) no suishin no gutaiteki na arikata ni tsuite no chōsa kenkyū hōkokusho at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Security for wireless sensor networks using identity-based cryptography
By Harsh Kupwade Patil
“Security for wireless sensor networks using identity-based cryptography” Metadata:
- Title: ➤ Security for wireless sensor networks using identity-based cryptography
- Author: Harsh Kupwade Patil
- Language: English
- Number of Pages: Median: 220
- Publisher: ➤ CRC Press/Taylor & Francis Group - Taylor & Francis Group - Auerbach Publishers, Incorporated
- Publish Date: 2012 - 2013 - 2016
- Publish Location: Boca Raton
“Security for wireless sensor networks using identity-based cryptography” Subjects and Themes:
- Subjects: ➤ Wireless sensor networks - Security measures - Wireless communication systems - Data encryption (Computer science) - Public key cryptography - Computers - Access control - Computer security - Internet - Security - Networking - General
Edition Identifiers:
- The Open Library ID: ➤ OL37142013M - OL30660046M - OL37270265M - OL33485546M - OL37310169M - OL37182403M - OL37182398M
- Online Computer Library Center (OCLC) ID: 815659938 - 859349409
- Library of Congress Control Number (LCCN): 2012034443
- All ISBNs: ➤ 9781466581265 - 1466581263 - 9781466538788 - 1439869022 - 1439869014 - 1138199532 - 0429065841 - 9780429065842 - 9781439869024 - 1466538783 - 1299992498 - 9781439869017 - 9781299992498 - 9781138199538
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Security for wireless sensor networks using identity-based cryptography at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Big Data Analytics with Applications in Insider Threat Detection
By Pallabi Parveen, Bhavani Thuraisingham, Mohammad Mehedy Masud and Latifur Khan
“Big Data Analytics with Applications in Insider Threat Detection” Metadata:
- Title: ➤ Big Data Analytics with Applications in Insider Threat Detection
- Authors: Pallabi ParveenBhavani ThuraisinghamMohammad Mehedy MasudLatifur Khan
- Language: English
- Publisher: ➤ Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2017 - 2018 - 2020
“Big Data Analytics with Applications in Insider Threat Detection” Subjects and Themes:
- Subjects: ➤ Computer security - Malware (computer software) - Data mining - Data processing - Malware (Computer software) - Big data - Computer crimes - Investigation - Computer networks - Access control
Edition Identifiers:
- The Open Library ID: ➤ OL37971078M - OL37973759M - OL34627026M - OL37980160M - OL34681855M - OL37970091M
- Online Computer Library Center (OCLC) ID: 1021185720
- All ISBNs: ➤ 1498705472 - 9781351636247 - 1351636243 - 9781498705486 - 1351645765 - 9781498705479 - 1315119455 - 9781351645768 - 1498705480 - 9781315119458 - 9780367657420 - 0367657422
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Big Data Analytics with Applications in Insider Threat Detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50Understanding public-key infrastructure
By Carlisle Adams

“Understanding public-key infrastructure” Metadata:
- Title: ➤ Understanding public-key infrastructure
- Author: Carlisle Adams
- Language: English
- Number of Pages: Median: 308
- Publisher: ➤ Sams - Macmillan Technical Pub.
- Publish Date: 1999
- Publish Location: Indianapolis, IN
“Understanding public-key infrastructure” Subjects and Themes:
- Subjects: ➤ Computer security - Cryptography - Access control - Computer networks - Computers - Security measures - Standards - Computer networks, security measures - Business enterprises, computer networks - Business enterprises - Public key infrastructure (Computer security)
Edition Identifiers:
- The Open Library ID: OL17002568M - OL8755259M
- Library of Congress Control Number (LCCN): 99060204
- All ISBNs: 9781578701667 - 157870166X
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Understanding public-key infrastructure at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
Wiki
Source: Wikipedia
Wikipedia Results
Search Results from Wikipedia
Access control
and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example
Controlled-access highway
A controlled-access highway is a type of highway that has been designed for high-speed vehicular traffic, with all traffic flow—ingress and egress—regulated
Role-based access control
mandatory access control (MAC) or discretionary access control (DAC). Role-based access control is a policy-neutral access control mechanism defined
Medium access control
802 LAN/MAN standards, the medium access control (MAC), also called media access control, is the layer that controls the hardware responsible for interaction
Attribute-based access control
Attribute-based access control (ABAC), also known as policy-based access control for IAM, defines an access control paradigm whereby a subject's authorization
Mandatory access control
In computer security, mandatory access control (MAC) refers to a type of access control by which a secured environment (e.g., an operating system or a
Access-control list
In computer security, an access-control list (ACL) is a list of permissions associated with a system resource (object or facility). An ACL specifies which
Discretionary access control
access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria (TCSEC) as a means of restricting access to
Network access control
Network access control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion
Access control matrix
In computer science, an access control matrix or access matrix is an abstract, formal security model of protection state in computer systems, that characterizes