Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for Access control

Warning: file_put_contents(cache/omni_65de75cf84b9bda33c1929b681b265dc.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of Pro TBB
dBooks

Pro TBB

By Michael Voss, Rafael Asenjo, James Reinders

C++ Parallel Programming with Threading Building Blocks...

View Book →
Cover of Encyclopedia of Software Engineering Three-Volume Set (Print)
Google Books

Encyclopedia of Software Engineering Three-Volume Set (Print)

By Phillip A. Laplante

Software engineering requires specialized knowledge of a broad spectrum of topics, including the construction of software and the platforms, applications, and environments in which the software operat...

View Book →
Cover of 14th International Congress for Applied Mineralogy (ICAM2019)
dBooks

14th International Congress for Applied Mineralogy (ICAM2019)

By Sergey Glagolev

Belgorod State Technological University named after V. G. Shukhov, 23–27 September 2019, Belgorod, Russia...

View Book →
Cover of Studies of welfare populations : data collection and research issues
Internet Archive

Studies of welfare populations : data collection and research issues

By Unknown Author

x, 526 p. ; 23 cm...

View Book →
Cover of AP European history : all access
Internet Archive

AP European history : all access

By Link, Jere

vii, 566 pages : 28 cm...

View Book →
Cover of The Massachusetts register
Google Books

The Massachusetts register

By Unknown Author

No description available....

View Book →
Cover of Business Process Management Workshops
Google Books

Business Process Management Workshops

By Arthur ter Hofstede, Boualem Benatallah, Hye-Young Paik

This book constitutes the thoroughly refereed post-workshop proceedings of 6 internationl workshops held in Brisbane, Australia, in conjunction with the 5th International Conference on Business Proces...

View Book →
Cover of Medical and Care Compunetics 4
Google Books

Medical and Care Compunetics 4

By Lodewijk Bos, Bernd Blobel

The role of the International Council on Medical and Care Compunetics (ICMCC) with regards to patient-related ICT has become obvious with the start of the Record Access Portal. This work aims to come ...

View Book →
Cover of Tobacco Control Policy in the Netherlands
dBooks

Tobacco Control Policy in the Netherlands

By Marc C. Willemsen

Between Economy, Public Health, and Ideology...

View Book →
Cover of Access to Online Resources
dBooks

Access to Online Resources

By Kristina Botyriute

A Guide for the Modern Librarian...

View Book →
Cover of Robotics
dBooks

Robotics

By Matjaž Mihelj, Tadej Bajd, Aleš Ude, Jadran Lenarčič, Al

...

View Book →
Cover of Primary Angioplasty
dBooks

Primary Angioplasty

By Timothy J Watson, Paul JL Ong, James E Tcheng

A Practical Guide...

View Book →
Cover of Cold Micro Metal Forming
dBooks

Cold Micro Metal Forming

By Frank Vollertsen, Sybille Friedrich, Bernd Kuhfuß, Peter Ma

Research Report of the Collaborative Research Center "Micro Cold Forming" (SFB 747), Bremen, Germany...

View Book →
Cover of Safer Healthcare
dBooks

Safer Healthcare

By Charles Vincent, René Amalberti

Strategies for the Real World...

View Book →
Cover of The South Texas Health Status Review
dBooks

The South Texas Health Status Review

By Amelie G. Ramirez, Ian M. Thompson, Leonel Vela

A Health Disparities Roadmap...

View Book →
Cover of AI based Robot Safe Learning and Control
dBooks

AI based Robot Safe Learning and Control

By Xuefeng Zhou, Zhihao Xu, Shuai Li, Hongmin Wu, Taobo Cheng,

...

View Book →
Cover of Operating Systems and Middleware
dBooks

Operating Systems and Middleware

By Max Hailperin

Supporting Controlled Interaction...

View Book →
Cover of Biofuels in Africa : opportunities, prospects, and challenges
Internet Archive

Biofuels in Africa : opportunities, prospects, and challenges

By Mitchell, Donald O

1 online resource (xxxii, 184 pages)...

View Book →
Cover of Your Post has been Removed
dBooks

Your Post has been Removed

By Frederik Stjernfelt, Anne Mette Lauritzen

Tech Giants and Freedom of Speech...

View Book →
Cover of Automatic Control with Experiments
dBooks

Automatic Control with Experiments

By Victor Manuel Hernández-Guzmán, Ramón Silva-Ortigoza

...

View Book →
Cover of Protest Movements in Asylum and Deportation
dBooks

Protest Movements in Asylum and Deportation

By Sieglinde Rosenberger, Verena Stern, Nina Merhaut

...

View Book →
Cover of NGINX Cookbook
dBooks

NGINX Cookbook

By Derek DeJonghe

Advanced Recipes for High-Performance Load Balancing...

View Book →
Cover of A Time for Metabolism and Hormones
dBooks

A Time for Metabolism and Hormones

By Paolo Sassone-Corsi, Yves Christen

...

View Book →
Cover of Responsive Open Learning Environments
dBooks

Responsive Open Learning Environments

By Sylvana Kroop, Alexander Mikroyannidis, Martin Wolpers

Outcomes of Research from the ROLE Project...

View Book →
Cover of Access Control, Authentication, and Public Key Infrastructure
Google Books

Access Control, Authentication, and Public Key Infrastructure

By Bill Ballad, Tricia Ballad, Erin Banks

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a pr...

View Book →
Cover of Drones and the Creative Industry
dBooks

Drones and the Creative Industry

By Virginia Santamarina-Campos, Marival Segarra-Oña

Innovative Strategies for European SMEs...

View Book →
Cover of The Hindu Kush Himalaya Assessment
dBooks

The Hindu Kush Himalaya Assessment

By Philippus Wester, Arabinda Mishra, Aditi Mukherji, Arun Bhak

Mountains, Climate Change, Sustainability and People...

View Book →
Cover of Managing Kubernetes Traffic with F5 NGINX
dBooks

Managing Kubernetes Traffic with F5 NGINX

By Amir Rawdat

A Practical Guide...

View Book →
Cover of Access Control for Databases
Google Books

Access Control for Databases

By Elisa Bertino, Gabriel Ghinita, Ashish Kamra

A comprehensive survey of the foundational models and recent research trends in access control models and mechanisms for database management systems....

View Book →
Cover of Modes of Bio-Bordering
dBooks

Modes of Bio-Bordering

By Nina Amelung, Rafaela Granja, Helena Machado

The Hidden (Dis)integration of Europe...

View Book →
Cover of SQL Server Concurrency
dBooks

SQL Server Concurrency

By Kalen Delaney

Locking, Blocking and Row Versioning...

View Book →
Cover of SQL Server Source Control Basics
dBooks

SQL Server Source Control Basics

By Robert Sheldon, Rob Richardson, Tony Davis

...

View Book →
Cover of Learn BlackBerry 10 App Development
dBooks

Learn BlackBerry 10 App Development

By Anwar Ludin

A Cascades-Driven Approach...

View Book →
Cover of Anti-Microbial Resistance in Global Perspective
dBooks

Anti-Microbial Resistance in Global Perspective

By Louise Ackers, Gavin Ackers-Johnson, Joanne Welsh, Daniel Ki

...

View Book →
Cover of The Whole Process of E-commerce Security Management System
Google Books

The Whole Process of E-commerce Security Management System

By Ronggang Zhang, Lijuan Fang, Xiaoping He, Chuan Wei

​This book systematically and integrally introduces the new security management theories and methods in the e-commerce environment. Based on the perspective of dynamic governance of the whole proces...

View Book →
Cover of Evaluating Information Retrieval and Access Tasks
dBooks

Evaluating Information Retrieval and Access Tasks

By Tetsuya Sakai, Douglas W. Oard, Noriko Kando

NTCIR's Legacy of Research Impact...

View Book →
Cover of Access Controlled
dBooks

Access Controlled

By Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zit

The Shaping of Power, Rights, and Rule in Cyberspace...

View Book →
Cover of Competition Authorities in South Eastern Europe
dBooks

Competition Authorities in South Eastern Europe

By Boris Begović, Dušan Popović

Building Institutions in Emerging Markets...

View Book →
Cover of Towards a Systemic Theory of Irregular Migration
dBooks

Towards a Systemic Theory of Irregular Migration

By Gabriel Echeverría

Explaining Ecuadorian Irregular Migration in Amsterdam and Madrid...

View Book →
Cover of Swift Notes for Professionals
dBooks

Swift Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Making Medicines in Africa
dBooks

Making Medicines in Africa

By Maureen Mackintosh, Geoffrey Banda, Paula Tibandebage, Watu

The Political Economy of Industrializing for Local Health...

View Book →
Cover of Taking Kubernetes from Test to Production
dBooks

Taking Kubernetes from Test to Production

By Jenn Gile

Improving Resilience, Visibility, and Security with Traffic Management Tools...

View Book →
Cover of CompTIA Security+ Certification Boxed Set (Exam SY0-301)
Google Books

CompTIA Security+ Certification Boxed Set (Exam SY0-301)

By Glen E. Clarke, Daniel Lachance

The best fully integrated CompTIA Security+ self-study package featuring 1200+ practice exam questions. Save 12% on this Boxed Set—with bonus electronic content! CompTIA Security+ Certification Boxe...

View Book →
Cover of Twin-Control
dBooks

Twin-Control

By Mikel Armendia, Mani Ghassempouri, Erdem Ozturk, Flavien Pey

A Digital Twin Approach to Improve Machine Tools Lifecycle...

View Book →
Cover of CakePHP Cookbook Documentation
dBooks

CakePHP Cookbook Documentation

By Cake Software Foundation

Release 4.x...

View Book →
Cover of Information Diffusion Management and Knowledge Sharing: Breakthroughs in Research and Practice
Google Books

Information Diffusion Management and Knowledge Sharing: Breakthroughs in Research and Practice

By Management Association, Information Resources

Within the past 10 years, tremendous innovations have been brought forth in information diffusion and management. Such technologies as social media have transformed the way that information is dissemi...

View Book →
Cover of Inventory Analytics
dBooks

Inventory Analytics

By Roberto Rossi

...

View Book →
Cover of Guide to Understanding Discretionary Access Control in Trusted Systems
Google Books

Guide to Understanding Discretionary Access Control in Trusted Systems

By Carole S. Jordan

No description available....

View Book →
Cover of Access Control in Data Management Systems
Google Books

Access Control in Data Management Systems

By Elena Ferrari

Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly cru...

View Book →
Cover of Theory and Applications of Ordered Fuzzy Numbers
dBooks

Theory and Applications of Ordered Fuzzy Numbers

By Piotr Prokopowicz, Jacek Czerniak, Dariusz Mikołajewski, Ł

A Tribute to Professor Witold Kosiński...

View Book →
Cover of The Emigrant Communities of Latvia
dBooks

The Emigrant Communities of Latvia

By Rita Kaša, Inta Mieriņa

National Identity, Transnational Belonging, and Diaspora Politics...

View Book →
Cover of Professional Web Accessibility Auditing Made Easy
dBooks

Professional Web Accessibility Auditing Made Easy

By Digital Education Strategies, The Chang School

Essential Skills for Web Developers, Content Creators, and Designers...

View Book →
Cover of Reactive Power Control in AC Power Systems
dBooks

Reactive Power Control in AC Power Systems

By Naser Mahdavi Tabatabaei, Ali Jafari Aghbolaghi, Nicu Bizon,

Fundamentals and Current Issues...

View Book →
Cover of Symfony
dBooks

Symfony

By Symfony Team

The Best Practices Book...

View Book →
Cover of Coyote sun
Internet Archive

Coyote sun

By Cumpián, Carlos, author

63 pages : 22 cm...

View Book →
Cover of Disrupting Finance
dBooks

Disrupting Finance

By Theo Lynn, John G. Mooney, Pierangelo Rosati, Mark Cummins

FinTech and Strategy in the 21st Century...

View Book →
Cover of IMPROVE - Innovative Modelling Approaches for Production Systems to Raise Validatable Efficiency
dBooks

IMPROVE - Innovative Modelling Approaches for Production Systems to Raise Validatable Efficiency

By Oliver Niggemann, Peter Schüller

Intelligent Methods for the Factory of the Future...

View Book →
Cover of Computational Science and Its Applications - ICCSA 2006
Google Books

Computational Science and Its Applications - ICCSA 2006

By Marina Gavrilova

The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. The volumes present a total of 664 pa...

View Book →
Cover of The Future of Election Administration
dBooks

The Future of Election Administration

By Mitchell Brown, Kathleen Hale, Bridgett A. King

Cases and Conversations...

View Book →
Cover of Easy Access: The Reference Handbook for Writers
Internet Archive

Easy Access: The Reference Handbook for Writers

By Unknown Author

Available on Internet Archive....

View Book →
Cover of STRAYER POD- ACCESS CONTROL and IDENTITY MANAGEMENT 3E
Google Books

STRAYER POD- ACCESS CONTROL and IDENTITY MANAGEMENT 3E

By Jones & Bartlett Learning, LLC

Access control protects resources against unauthorized viewing, tampering, or destruction. These systems serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized d...

View Book →
Cover of Musical Haptics
dBooks

Musical Haptics

By Stefano Papetti, Charalampos Saitis

...

View Book →
Cover of Techlash
dBooks

Techlash

By Ian I. Mitroff, Rune Storesund

The Future of the Socially Responsible Tech Organization...

View Book →
Cover of Version Control with Subversion
dBooks

Version Control with Subversion

By C. Michael Pilato, Ben Collins-Sussman, Brian W. Fitzpatrick

Next Generation Open Source Version Control...

View Book →
Cover of Electronic Access Control
Google Books

Electronic Access Control

By Thomas L. Norman

Thomas L. Norman...

View Book →
Cover of Autonomous Control for a Reliable Internet of Services
dBooks

Autonomous Control for a Reliable Internet of Services

By Ivan Ganchev, R. van der Mei, Hans van den Berg

Methods, Models, Approaches, Techniques, Algorithms, and Tools...

View Book →
Cover of Information Infrastructures within European Health Care
dBooks

Information Infrastructures within European Health Care

By Margunn Aanestad, Miria Grisot, Ole Hanseth, Polyxeni Vassil

Working with the Installed Base...

View Book →
Cover of NL ARMS Netherlands Annual Review of Military Studies 2020
dBooks

NL ARMS Netherlands Annual Review of Military Studies 2020

By Frans Osinga, Tim Sweijs

Deterrence in the 21st Century—Insights from Theory and Practice...

View Book →
Cover of Control Theory Tutorial
dBooks

Control Theory Tutorial

By Steven Frank

Basic Concepts Illustrated by Software Examples...

View Book →
Cover of Social Theory of Fear
dBooks

Social Theory of Fear

By Geoffrey R. Skoll

Terror, Torture, and Death in a Post-Capitalist World...

View Book →
Cover of Internet of Things and Access Control
Google Books

Internet of Things and Access Control

By Shantanu Pal

This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large...

View Book →
Cover of Raspberry Pi Camera Guide
dBooks

Raspberry Pi Camera Guide

By Dan Aldred, Wesley Archer, Jody Carter, PJ Evans, Richard Ha

For Camera Module & High Quality Camera...

View Book →
Cover of The Los Angeles Angels of Anaheim
Internet Archive

The Los Angeles Angels of Anaheim

By Stewart, Mark, 1960 July 7-

48 pages : 24 cm...

View Book →
Cover of Earth Observation Open Science and Innovation
dBooks

Earth Observation Open Science and Innovation

By Pierre-Philippe Mathieu, Christoph Aubrecht

...

View Book →
Cover of Mobilities of the Highly Skilled towards Switzerland
dBooks

Mobilities of the Highly Skilled towards Switzerland

By Laure Sandoz

The Role of Intermediaries in Defining "Wanted Immigrants"...

View Book →
Cover of Handbook of research on teaching
Internet Archive

Handbook of research on teaching

By Unknown Author

1 online resource (ix, 1539 pages) :...

View Book →
Cover of Basic Mac skills
Internet Archive

Basic Mac skills

By Lawton, Rod

x, 262 pages : 20 cm...

View Book →
Cover of Canadian medicare : we need it and we can keep it
Internet Archive

Canadian medicare : we need it and we can keep it

By Duckett, S. J

1 online resource...

View Book →
Cover of Workers' rights
Internet Archive

Workers' rights

By Prior, Katherine

46 pages : 28 cm...

View Book →
Cover of The Cloud-to-Thing Continuum
dBooks

The Cloud-to-Thing Continuum

By Theo Lynn, John G. Mooney, Brian Lee, Patricia Takako Endo

Opportunities and Challenges in Cloud, Fog and Edge Computing...

View Book →
Cover of Peterson's ultimate new SAT tool kit
Internet Archive

Peterson's ultimate new SAT tool kit

By Johnson, Drew, 1970-

viii, 597 pages : 27 cm +...

View Book →
Cover of "Code of Massachusetts regulations, 2008"
Google Books

"Code of Massachusetts regulations, 2008"

By Unknown Author

Archival snapshot of entire looseleaf Code of Massachusetts Regulations held by the Social Law Library of Massachusetts as of January 2020....

View Book →
Cover of Public Health Ethics: Cases Spanning the Globe
dBooks

Public Health Ethics: Cases Spanning the Globe

By Drue H. Barrett, Leonard W. Ortmann, Angus Dawson, Carla Sae

...

View Book →
Cover of The Illusion of Risk Control
dBooks

The Illusion of Risk Control

By Gilles Motet, Corinne Bieder

What Does it Take to Live With Uncertainty?...

View Book →
Cover of Xamarin.Forms Succinctly
dBooks

Xamarin.Forms Succinctly

By Alessandro Del Sole

...

View Book →
Cover of Parents and digital technology : how to raise the connected generation
Internet Archive

Parents and digital technology : how to raise the connected generation

By Hayman, Suzie, 1949- author

1 online resource...

View Book →
Cover of Rational Cybersecurity for Business
dBooks

Rational Cybersecurity for Business

By Dan Blum

The Security Leaders' Guide to Business Alignment...

View Book →
Cover of Access Control Systems
Google Books

Access Control Systems

By Messaoud Benantar

This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access contro...

View Book →
Cover of Measurement and Control of Charged Particle Beams
dBooks

Measurement and Control of Charged Particle Beams

By Michiko G. Minty, Frank Zimmermann

...

View Book →
Cover of Vermin, Victims and Disease
dBooks

Vermin, Victims and Disease

By Angela Cassidy

British Debates over Bovine Tuberculosis and Badgers...

View Book →
Cover of Risk Communication for the Future
dBooks

Risk Communication for the Future

By Mathilde Bourrier, Corinne Bieder

Towards Smart Risk Governance and Safety Management...

View Book →
Cover of Modern C
dBooks

Modern C

By Jens Gustedt

...

View Book →
Cover of Office 365
dBooks

Office 365

By Matthew Katzer, Don Crawford

Migrating and Managing Your Business in the Cloud...

View Book →
Cover of Creating Healthy and Sustainable Buildings
dBooks

Creating Healthy and Sustainable Buildings

By Mateja Dovjak, Andreja Kukec

An Assessment of Health Risk Factors...

View Book →
Cover of Advancing Energy Policy
dBooks

Advancing Energy Policy

By Chris Foulds, Rosie Robison

Lessons on the integration of Social Sciences and Humanities...

View Book →
Cover of Security as Code
dBooks

Security as Code

By BK Sarthak Das, Virginia Chu

DevSecOps Patterns with AWS...

View Book →
Cover of Advances in Energy System Optimization
dBooks

Advances in Energy System Optimization

By Valentin Bertsch, Armin Ardone, Michael Suriyah, Wolf Fichtn

Proceedings of the 2nd International Symposium on Energy System Optimization...

View Book →
Cover of Surgical Ophthalmic Oncology
dBooks

Surgical Ophthalmic Oncology

By Sonal S. Chaugule, Santosh G. Honavar, Paul T. Finger

A Collaborative Open Access Reference...

View Book →
Cover of iRODS primer: integrated rule-oriented data system
Internet Archive

iRODS primer: integrated rule-oriented data system

By Arcot Rajasekar

/type/text...

View Book →
Cover of The InfoSec Handbook
dBooks

The InfoSec Handbook

By Umesh Hodeghatta Rao, Umesha Nayak

An Introduction to Information Security...

View Book →
Cover of Renewables for Energy Access and Sustainable Development in East Africa
dBooks

Renewables for Energy Access and Sustainable Development in East Africa

By Manfred Hafner, Simone Tagliapietra, Giacomo Falchetta, Giov

...

View Book →
Cover of Environmental Governance in Latin America
dBooks

Environmental Governance in Latin America

By Fábio de Castro, Barbara Hogenboom, Michiel Baud

...

View Book →
Cover of Attribute-Based Access Control
Google Books

Attribute-Based Access Control

By Vincent C. Hu, David F. Ferraiolo, Ramaswamy Chandramouli, D

This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information...

View Book →
Cover of Stochastics of Environmental and Financial Economics
dBooks

Stochastics of Environmental and Financial Economics

By Fred Espen Benth, Giulia Di Nunno

Centre of Advanced Study, Oslo, Norway, 2014-2015...

View Book →
Cover of VMware vSphere 4 implementation
Internet Archive

VMware vSphere 4 implementation

By Laverick, Mike

xxviii, 659 p. : 23 cm...

View Book →
Cover of Advancing the Science of Cancer in Latinos
dBooks

Advancing the Science of Cancer in Latinos

By Amelie G. Ramirez, Edward J. Trapido

...

View Book →
Cover of Enabling Sustainable Energy Transitions
dBooks

Enabling Sustainable Energy Transitions

By Siddharth Sareen

Practices of legitimation and accountable governance...

View Book →
Cover of Access Denied
dBooks

Access Denied

By Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zit

The Practice and Policy of Global Internet Filtering...

View Book →
Cover of eIoT
dBooks

eIoT

By Steffi O. Muhanji, Alison E. Flint, Amro M. Farid

The Development of the Energy Internet of Things in Energy Infrastructure...

View Book →
Cover of Building the Infrastructure for Cloud Security
dBooks

Building the Infrastructure for Cloud Security

By Raghu Yeluri, Enrique Castro-Leon

A Solutions view...

View Book →
Cover of Energy in Africa
dBooks

Energy in Africa

By Manfred Hafner, Simone Tagliapietra, Lucia de Strasser

Challenges and Opportunities...

View Book →
Cover of Flexitranstore
dBooks

Flexitranstore

By Bálint Németh, Lambros Ekonomou

Special Session in the 21st International Symposium on High Voltage Engineering (ISH 2019)...

View Book →
Cover of Biological Invasions in South Africa
dBooks

Biological Invasions in South Africa

By Brian W. van Wilgen, John Measey, David M. Richardson, John

...

View Book →
Cover of Migration and Social Protection in Europe and Beyond (Volume 1)
dBooks

Migration and Social Protection in Europe and Beyond (Volume 1)

By Jean-Michel Lafleur, Daniela Vintila

Comparing Access to Welfare Entitlements...

View Book →
Cover of Sowing Legume Seeds, Reaping Cash
dBooks

Sowing Legume Seeds, Reaping Cash

By Essegbemon Akpo, Christopher O. Ojiewo, Lucky O. Omoigui, Je

A Renaissance within Communities in Sub-Saharan Africa...

View Book →
Cover of Official (ISC)2 Guide to the CISSP CBK
Google Books

Official (ISC)2 Guide to the CISSP CBK

By Steven Hernandez, CISSP

The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global co...

View Book →
Cover of Intel Trusted Execution Technology for Server Platforms
dBooks

Intel Trusted Execution Technology for Server Platforms

By William Futral, James Greene

A Guide to More Secure Datacenters...

View Book →
Cover of Data-Driven Policy Impact Evaluation
dBooks

Data-Driven Policy Impact Evaluation

By Nuno Crato, Paolo Paruolo

How Access to Microdata is Transforming Policy Design...

View Book →
Cover of Collective Actions in Europe
dBooks

Collective Actions in Europe

By Csongor István Nagy

A Comparative, Economic and Transsystemic Analysis...

View Book →
Cover of Role-based Access Control
Google Books

Role-based Access Control

By David Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli

The authors explain role based access control (RBAC), its administrative and cost advantages, implementation issues and imigration from conventional access control methods to RBAC....

View Book →
Cover of Indigenous Life Projects and Extractivism
dBooks

Indigenous Life Projects and Extractivism

By Cecilie Vindal Ødegaard, Juan Javier Rivera Andía

Ethnographies from South America...

View Book →
Cover of Who's buying household furnishings, services and supplies
Internet Archive

Who's buying household furnishings, services and supplies

By Various

1 online resource (138 pages)...

View Book →
Cover of Linux Appliance Design
dBooks

Linux Appliance Design

By Bob Smith, John Hardin, Graham Phillips, Bill Pierce

A Hands-on Guide to Building Linux Appliances...

View Book →
Cover of Custom Office and Access 2016 IUPUI
Internet Archive

Custom Office and Access 2016 IUPUI

By Unknown Author

Available on Internet Archive....

View Book →