Search Results: 'access control'

Search

×
×
×
×
315 results for "access control"
Computer Access Control: Federated Identity By Kyle Bresnahan
Paperback: List Price: $35.00 $24.50 | You Save: 30%
Prints in 3-5 business days
(1 Ratings)
Federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
User centred access control for home networks By Robin Laurén
Paperback: $10.97
Prints in 3-5 business days
My master's thesis in which i dig into the backgrounds of home networks and how access control could be taken care of in it. If home networks are supposed to become popular, they and the security of... More > them, need to be designed with normal people in mind, people who aren't neccessarily computer geeks, and shouldn't need to be that either.< Less
User centred access control for home networks By Robin Laurén
eBook (PDF): $0.00
My master's thesis in which i dig into the backgrounds of home networks and how access control could be taken care of in it. If home networks are supposed to become popular, they and the security of... More > them, need to be designed with normal people in mind, people who aren't neccessarily computer geeks, and shouldn't need to be that either.< Less
Modularizing Java Access Control (An Aspect Oriented Programming Prospective) By Mohammad Khalid Pandit
Paperback: $15.98
Prints in 3-5 business days
It is inevitable that some concerns crosscut a sizeable application, resulting in code scattering and tangling. This issue is particularly severe for security-related concerns. It is difficult to be... More > confident about the security of an application when the implementation of its security-related concerns is scattered all over the code and tangled with other concerns, making global reasoning about security precarious. The implementation of security mechanisms and policies often interacts with the core functionality of the application, resulting in tangled and unmanageable code with high security risks. AspectJ oriented programming (AOP) can help to reduce these risks by removing the tangling and scattering of the code. The case of access control in Java, which turns out to be a crosscutting concern with a nonmodular implementation based on runtime stack inspection. We describe the process of modularizing access control in Java by means of Aspect-Oriented Programming (AOP).< Less
Guided Access for iPhone/iPad By Nishatul Majid
eBook (ePub): $4.99
***Updated for the iOS 7 Guided Access Control is one of the unique features of iOS 6. This is not only really really fun to use, but also an extremely powerful tool to control your device's access.... More > Imagine how it would be, if you can let your kids to play and learn with these beautiful interfaces, occasionally you can let your friends to check their mails or, may be, take photos, all without a drop of being concerned about accidental data loss, scrutinizing your settings/preferences or any kind of suspicious sneak peaks. The concept of "Single App" mode will let you control each and every ways of dealing your device, exactly in the way you need. The goal of this book is to explain how this feature works, as well as, where and how this should be used. Those, who love to keep their entire world in their iPhone( or iPad/ iPod touch), this tutorial is highly recommended.< Less
Guided Access for iPhone/iPad By Nishatul Majid
eBook (PDF): $4.99
(1 Ratings)
Guided Access Control is one of the unique features of iOS 6. This is not only really really fun to use, but also an extremely powerful tool to control your device's access. Imagine how it would be,... More > if you can let your kids to play and learn with these beautiful interfaces, occasionally you can let your friends to check their mails or, may be, take photos, all without a drop of being concerned about accidental data loss, scrutinizing your settings/preferences or any kind of suspicious sneak peaks. The concept of "Single App" mode will let you control each and every ways of dealing your device, exactly in the way you need. The goal of this book is to explain how this feature works, as well as, where and how this should be used. Those, who love to keep their entire world in their iPhone( or iPad/ iPod touch), this tutorial is highly recommended.< Less
Basic Cisco Security Exercises for Pix Firewall, IOS firewall, and Access Control Server By Thomas Larus
eBook (PDF): $0.00
A small set of hands-on security practice labs with solution configuration scripts and explanations.
Basic Cisco Security Exercises for Pix Firewall, Ios Firewall, and Access Control Server By Thomas P. Larus
eBook (ePub): $3.99
A small set of hands-on security practice labs with solution configuration scripts and explanations.
Basic Cisco Security Exercises for Pix Firewall, IOS firewall, and Access Control Server By Thomas Larus
Paperback: $8.13
Prints in 3-5 business days
A small set of hands-on security practice labs with solution configuration scripts and explanations.
EASY ACCESS TO CHEMISTRY - A STEP THROUGH INFORMATION TECHNOLOGY By Dr. Darsana B.G.
Paperback: $5.96
Prints in 3-5 business days
Multimedia includes the computer-controlled integration of text, graphics, drawings, stills and moving images (Video), animation, audio, and any other media where every type of information can be... More > represented, stored, transmitted and processed digitally. It also means the use of electronic media to store and experience multimedia content. It means that computer information can be represented through audio, graphics, image, video and animation in addition to traditional media (text and graphics). Thus it is a mix of different forms.< Less

Top 10

see more >
 
 
 
 
 
5
Birth Log Book Birth Log Book By Emily Rumsey
Paperback: $20.00
 
 
6
Bootstrap Student Workbook Bootstrap Student... By Emmanuel Schanzer et al.
Paperback: $10.00
 
 
 
 
9