Loading...
Error: Cannot Load Popup Box
Language:
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
中文(简体)
中文(繁體)
Thai
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Search For:
in:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Advanced
Retain my current filters
Home
>
Search:
Suggested Topics
... within your search.
Access control
Computer security
(4)
Computer networks
(3)
Computers
(2)
Data protection
(2)
Electronic book
(2)
more ...
Additional Suggested Topics
... within your search.
Privacy, Right of
(2)
Security measures
(2)
BPEL (Computer program language)
(1)
Computer Security
(1)
Confidential communications
(1)
Configurations
(1)
Congresses and conventions
(1)
Cryptography
(1)
Flow control (Data transmission systems)
(1)
Information Storage and Retrieval
(1)
Information superhighway
(1)
Internet
(1)
KMUTT research reports
(1)
Law and legislation
(1)
Management information systems
(1)
Medical Records Systems, Computerized
(1)
Medical records
(1)
Privacy
(1)
Remote access
(1)
Smart cards
(1)
Web services
(1)
Windows CardSpace
(1)
less ...
Showing
1
-
8
of
8
for search:
''
, query time: 0.03s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Handbook of applied cryptography
by
Menezes, A. J. 1965-
Published 1997
Call Number:
Loading
Located:
Loading
book distributed by CRC Press. Purchase or institutional license may be required for access.
Add to Favorites
Key capabilities of an electronic health record system letter report /
Published 2003
Call Number:
Loading
Located:
Loading
Get full text
Add to Favorites
Critical information infrastructure protection and the law an overview of key issues /
Published 2003
Call Number:
Loading
Located:
Loading
Get full text
Add to Favorites
Smart cards, tokens, security and applications /
by
Mayes, Keith E
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Understanding Windows CardSpace : an introduction to the concepts and challenges of digital identities /
by
Bertocci, Vittorio
Published 2008
Call Number:
Loading
Located:
Loading
Loading...
MONOGRAPHS
Add to Favorites
Information flow based security control beyond RBAC : how to enable fine-grained security policy enforcement in business processes beyond limitations of role-based access...
by
Fischer-Hellmann, Klaus-Peter
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Information security and privacy research : 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012 : proceedings /
Published 2012
Call Number:
Loading
Located:
Loading
Full Text
EBOOKS
Add to Favorites
Reasoning about multiple access control confrigurations
by
Supakit Dangprasert
Call Number:
Loading
Located:
Loading
Loading...
ARTICLES
Add to Favorites
Search Tools:
Get RSS Feed
Email this Search
Save Search
Narrow Search
Remove Filters
Suggested Topics: Access control
Institution
KMUTT
(8)
Library
mai
(5)
Format
EBOOKS
(2)
MONOGRAPHS
(2)
ARTICLES
(1)
Call Number
Q - Science
(4)
T - Technology
(2)
R - Medicine
(1)
Author
Bertocci, Vittorio
(1)
Fischer-Hellmann, Klaus-Peter
(1)
Mayes, Keith E
(1)
Menezes, A. J. 1965-
(1)
Supakit Dangprasert
(1)
Language
English
(8)
Genre
Electronic books
(3)
Handbooks, manuals, etc
(1)
Region
United States
(2)
Year of Publication
From:
To:
Search Options
Search History
Advanced Search
Find More
Browse the Catalog
Browse Alphabetically
Course Reserves
New Items
Need Help?
Search Tips
Ask a Librarian
FAQs
KMUTT-LM Website