Tomeki

Explore Books on
access control

1-24 of 3,076 Books

View Medicare By United States. General Accounting Office

Medicare

Medicare

By United States. General Accounting Office

View Public hearing before Senate Judiciary Committee By New Jersey. Legislature. Senate. Judiciary Committee.

Public hearing before Senate Judiciary Committee

Public hearing before Senate Judiciary Committee

By New Jersey. Legislature. Senate. Judiciary Committee.

View Tax systems modernization By United States. General Accounting Office

Tax systems modernization

Tax systems modernization

By United States. General Accounting Office

View Information security By United States. General Accounting Office

Information security

Information security

By United States. General Accounting Office

View Deployment Guide Series By IBM Redbooks
Cover of Deployment Guide Series by ibm redbooks

Deployment Guide Series

By IBM Redbooks

View Nuclear security By United States. General Accounting Office

Nuclear security

Nuclear security

By United States. General Accounting Office

View Network Security Assessment By Chris McNab
Cover of Network Security Assessment by chris mcnab

Network Security Assessment

By Chris McNab

View School law and the public schools By Nathan L. Essex
Cover of School law and the public schools by nathan l. essex

School law and the public schools

By Nathan L. Essex

View The net delusion By Evgeny Morozov,E. Morozov,Eduardo G. Murillo
Cover of The net delusion by evgeny morozov,e. morozov,eduardo g. murillo

The net delusion

By Evgeny Morozov,E. Morozov,Eduardo G. Murillo

View Security protocols By Bruce Christianson,Bruno Crispo,James A. Malcolm,Michael Roe
Cover of Security protocols by bruce christianson,bruno crispo,james a. malcolm,michael roe

Security protocols

By Bruce Christianson,Bruno Crispo,James A. Malcolm,Michael Roe

View Various bills and resolutions By United States. Congress. House. Committee on Foreign Affairs

Various bills and resolutions

Various bills and resolutions

By United States. Congress. House. Committee on Foreign Affairs

View Information security By United States. General Accounting Office. Accounting and Information Management Division

Information security

Information security

By United States. General Accounting Office. Accounting and Information Management Division

View Secure data management By Willem Jonker,Milan Petkovic
Cover of Secure data management by willem jonker,milan petkovic

Secure data management

By Willem Jonker,Milan Petkovic

View Security in computing By Charles P. Pfleeger,Charles P. Pfleeger,Shari Lawrence Pfleeger,Jonathan Margulies
Cover of Security in computing by charles p. pfleeger,charles p. pfleeger,shari lawrence pfleeger,jonathan margulies

Security in computing

By Charles P. Pfleeger,Charles P. Pfleeger,Shari Lawrence Pfleeger,Jonathan Margulies

View Guide to computer network security By Joseph Migga Kizza
Cover of Guide to computer network security by joseph migga kizza

Guide to computer network security

By Joseph Migga Kizza

View Network security By Charlie Kaufman
Cover of Network security by charlie kaufman

Network security

By Charlie Kaufman

View Data Privacy for the Smart Grid By Rebecca Herold,Christine Hertzog

Data Privacy for the Smart Grid

Data Privacy for the Smart Grid

By Rebecca Herold,Christine Hertzog

View Information security By United States. General Accounting Office. Accounting and Information Management Division

Information security

Information security

By United States. General Accounting Office. Accounting and Information Management Division

View Validating the correctness of hardware implementations of the NBS data encryption standard By Jason Gait
Cover of Validating the correctness of hardware implementations of the NBS data encryption standard by jason gait

Validating the correctness of hardware implementations of the NBS data encryption standard

By Jason Gait

View Customs Service By United States. General Accounting Office

Customs Service

Customs Service

By United States. General Accounting Office

View Criminal justice information policy By Robert R. Belair

Criminal justice information policy

Criminal justice information policy

By Robert R. Belair

View Computer security By United States. General Accounting Office

Computer security

Computer security

By United States. General Accounting Office

View 802.1X port-based authentication By Edwin Lyle Brown
Cover of 802.1X port-based authentication by edwin lyle brown

802.1X port-based authentication

By Edwin Lyle Brown

View Security for wireless sensor networks using identity-based cryptography By Harsh Kupwade Patil

Security for wireless sensor networks using identity-based cryptography

Security for wireless sensor networks using identity-based cryptography

By Harsh Kupwade Patil