Produktart
Zustand
Einband
Weitere Eigenschaften
Gratisversand
Land des Verkäufers
Verkäuferbewertung
Verlag: Elsevier Science & Technology, 1997
ISBN 10: 0750699329ISBN 13: 9780750699327
Anbieter: Better World Books, Mishawaka, IN, USA
Buch
Zustand: Good. Used book that is in clean, average condition without any missing pages.
Verlag: McGraw-Hill Education, 2007
ISBN 10: 0071487514ISBN 13: 9780071487511
Anbieter: AwesomeBooks, Wallingford, Vereinigtes Königreich
Buch
Paperback. Zustand: Very Good. Master Locksmithing: An Expert's Guide to Master Keying, Intruder Alarms, Access Control Systems, High-security Locks, Safe Manipulation Drilling This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. .
Verlag: Butterworth, 1988
ISBN 10: 0409900834ISBN 13: 9780409900835
Anbieter: Anybook.com, Lincoln, Vereinigtes Königreich
Buch
Zustand: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has hardback covers. Clean from markings. In good all round condition. Dust jacket in good condition. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,650grams, ISBN:0409900834.
Verlag: INDEPENDENTLY PUBLISHED, 2018
ISBN 10: 1718139802ISBN 13: 9781718139800
Anbieter: moluna, Greven, Deutschland
Buch
Zustand: New.
KTH Engineering Sciences, Stockholm 2011. iv, 120 pp. Printed wrapper. Fine condition.
Verlag: 5STARCooks, 2019
ISBN 10: 0655907041ISBN 13: 9780655907046
Anbieter: Buchpark, Trebbin, Deutschland
Buch
Zustand: Sehr gut. Zustand: Sehr gut - Gepflegter, sauberer Zustand. | Seiten: 304 | Sprache: Englisch.
Mehr Angebote von anderen Verkäufern bei ZVAB
Gebraucht ab EUR 58,19
Verlag: Jones & Bartlett Learning (edition 3), 2020
ISBN 10: 1284198359ISBN 13: 9781284198355
Anbieter: BooksRun, Philadelphia, PA, USA
Buch
Paperback. Zustand: As New. 3. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported.
Verlag: Springer US, 2010
ISBN 10: 1441934731ISBN 13: 9781441934734
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access control mechanisms that are emerging with the latest Internet programming technologies, and explores all models employed and how they work. The latest role-based access control (RBAC) standard is also highlighted.This unique technical reference is designed for security software developers and other security professionals as a resource for setting scopes of implementations with respect to the formal models of access control systems. The book is also suitable for advanced-level students in security programming and system design.
Verlag: Springer US, 2005
ISBN 10: 0387004459ISBN 13: 9780387004457
Anbieter: moluna, Greven, Deutschland
Buch
Zustand: New. First book that solely addresses identity management and access control systemsProvides perspective on foundations of programming systems securityDelves into trust models and the theory behind access control systemsThis essential.
Verlag: McGraw-Hill Education (edition 2)
ISBN 10: 1259550192ISBN 13: 9781259550195
Anbieter: BooksRun, Philadelphia, PA, USA
Buch
Printed Access Code. Zustand: New. 2. STANDALONE access code. Brand new item, never opened! Ship within 24hrs. APO/FPO addresses supported.
Verlag: Springer International Publishing, 2010
ISBN 10: 3031007085ISBN 13: 9783031007088
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends. Table of Contents: Access Control: Basic Concepts / Discretionary Access Control for Relational Data Management Systems / Discretionary Access Control for Advanced Data Models / Mandatory Access Control / Role-based Access Control / Emerging Trends in Access Control.
Verlag: Cham, Springer International Publishing., 2014
ISBN 10: 3319073281ISBN 13: 9783319073286
Anbieter: Antiquariat im Hufelandhaus GmbH vormals Lange & Springer, Berlin, Deutschland
Buch
ed. 2014. 235 mm x 155 mm. X, 141 p. Hardcover. Versand aus Deutschland / We dispatch from Germany via Air Mail. Einband bestoßen, daher Mängelexemplar gestempelt, sonst sehr guter Zustand. Imperfect copy due to slightly bumped cover, apart from this in very good condition. Stamped. Stamped. Sprache: Englisch.
Mehr Angebote von anderen Verkäufern bei ZVAB
Neu ab EUR 109,42
Gebraucht ab EUR 14,00
Mehr entdecken Hardcover
Verlag: Springer International Publishing, 2016
ISBN 10: 3319343556ISBN 13: 9783319343556
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing. From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources. Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.
Verlag: Springer International Publishing, 2023
ISBN 10: 3030810917ISBN 13: 9783030810917
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS.The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms.This book is designed to serve the computer science and the cybersecurity community including researchers,academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.
Verlag: Springer International Publishing, 2022
ISBN 10: 3030810887ISBN 13: 9783030810887
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, theoretical, and foundational access control solutions. This was developed by the authors to provide an overall broader perspective and grounded approach to solve access control problems in IoT and CPS.The authors discuss different architectures, frameworks, access control models, implementation scenarios, and a broad set of use-cases in different IoT and CPS domains. This provides readers an intuitive and easy to read set of chapters. The authors also discuss IoT and CPS access control solutions provided by key industry players including Amazon Web Services (AWS) and Google Cloud Platform (GCP). It provides extensions of the authors proposed fine grained solutions with these widely used cloud and edge supported platforms.This book is designed to serve the computer science and the cybersecurity community including researchers,academicians and students. Practitioners who have a wider interest in IoT, CPS, privacy and security aspects will also find this book useful. Thanks to the holistic planning and thoughtful organization of this book, the readers are expected to gain in-depth knowledge of the state-of-the-art access control architectures and security models for resilient IoT and CPS.
Verlag: BiblioGov, 2011
ISBN 10: 1240743890ISBN 13: 9781240743896
Anbieter: moluna, Greven, Deutschland
Buch
Zustand: New. KlappentextThe BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democ.
Verlag: Springer International Publishing, 2022
ISBN 10: 3030650006ISBN 13: 9783030650001
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large-scale IoT systems, in particular, the need for access control, identity management, delegation of access rights and the provision of trust within such systems. It introduces a policy-based access control approach for the IoT that provides fine-grained access for authorized users to services while protecting valuable resources from unauthorized access. Further, the book discusses an identity-less, asynchronous and decentralized delegation model for the IoT leveraging the advantage of blockchain technology. It also presents an approach of attribute-based identity and examines the notion of trust in an IoT context by considering the uncertainty that exists in such systems. Fully explaining all the techniques used, the book is of interest to engineers, researchers and scientists working in the field of the wireless sensor networks, IoT systems and their access control management.
Verlag: Springer International Publishing, 2021
ISBN 10: 3030649970ISBN 13: 9783030649975
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large-scale IoT systems, in particular, the need for access control, identity management, delegation of access rights and the provision of trust within such systems. It introduces a policy-based access control approach for the IoT that provides fine-grained access for authorized users to services while protecting valuable resources from unauthorized access. Further, the book discusses an identity-less, asynchronous and decentralized delegation model for the IoT leveraging the advantage of blockchain technology. It also presents an approach of attribute-based identity and examines the notion of trust in an IoT context by considering the uncertainty that exists in such systems. Fully explaining all the techniques used, the book is of interest to engineers, researchers and scientists working in the field of the wireless sensor networks, IoT systems and their access control management.
Verlag: Addison Wesley Imprint in der Pearson Education Deutschland Auflage: 1 (10. Oktober 2007), 2007
ISBN 10: 3827323630ISBN 13: 9783827323637
Anbieter: BUCHSERVICE / ANTIQUARIAT Lars Lutzer, Wahlstedt, Deutschland
Buch
Hardcover. Zustand: gut. Auflage: 1 (10. Oktober 2007). Debian Hat Informatik EDV Betriebssysteme Benutzeroberflächen Informatik Datenkommunikation Netzwerke Kernel Linux Mac red security SELinux Sicherheit SUSE Zwei Mandatory Access Control-Systeme haben in die grossen Linux-Distributionen Eingang gefundenSELinux bei Red Hat, Fedora Core und Debian, AppArmor bei SUSE Linux. Damit gehört ihre wirksame Konfiguration und Anwendung zu den Pflichtaufgaben jedes Linux-Administrators. Ralf Spenneberg beschreibt beide MAC-Systeme detailliert, mit deutlichem Schwerpunkt auf SELinux. Er erläutert zunächst AppArmor, von der Installation über die Analyse der Überwachungsprotokolle und -berichte bis hin zu konkreten Szenarien wie der Überwachung von PHP-Anwendungen oder Shellscripts. Dann widmet er sich ausführlich SELinux und führt durch die Grundlagen, die Anwendung und erste Anpassungen, bevor er einzelne Policys und konkrete Anwendungsbeispiele wie z.B. die Absicherung eines Webservers mit SELinux vorstellt. Er zeigt außerdem, wie bestehende SELinux-Policys erweitert und eigene Policys entwickelt werden und stellt in einer Referenz die wichtigsten SELinux-Kommandos vor. Kapitel zur Installation von SELinux und AppArmor, ein Vergleich ihrer Performance sowie Kapitel über Tools zur SELinux-Policy-Erstellung und -Analyse runden das Buch zu einer Pflichtlektüre für sicherheitsbewusste Administratoren ab. Zu diesem Thema SELinux (Security Enhanced Linux, u.a. von der NSA entwickelt) bietet zusätzlich zum klassischen Rechtesystem (Benutzer A aus Gruppe X darf eine Datei lesen & schreiben, Benutzer B aus Gruppe Y nur lesen etc.) ein zusätzliches System, das nicht auf den UNIX Benutzern oder Gruppen basiert, sondern abstrakte Rollen und Typen verwendet und so nicht über klassische Wege, wie die Erlangung von Superuser-Rechten o.Ä. korrumpierbar ist. Da SELinux im Gegensatz zu anderen ähnlichen Projekten bereits Bestandteil des Linux-Kernels 2.6 ist, ist es in fast jeder Linux-Distribution verfügbar und wird dort in Zukunft eine wichtige Rolle spielen. Wo bislang die Kenntnis des Rechtesystems ausreichte, werden Anwender künftig SELinux-Richtlinien verwalten können müssen, um die Sicherheit ihres System zu administrieren. Zu diesem Titel In seinem vierten Buch stellt Security-Guru Ralf Spenneberg dieses Rechte-System unter Linux vor. Nach einer Einführung in SELinux beschreibt er, wie gezielt oder allgemein vergebene Richtlinien zur Systemüberwachung verwaltet werden. Am Beispiel des Tomcat-Moduls für Apache zeigt Spenneberg, wie bestehende Richtlinien (hier zu Apache) auf neue Dienste (hier Tomcat) hin erweitert werden. Er zeigt auch, wie man mit SELinux neue Richtlinien für neue Dienste erstellt. SELinux & AppArmor Mandatory Access Control für Linux einsetzen und verwalten mit CD-ROM [Gebundene Ausgabe] Ralf Spenneberg (Autor) In deutscher Sprache. 384 pages. 24,2 x 17,2 x 3,2 cm.