Skip to contents

  1. Gasser, Morrie [Author]

    Building a secure computer system

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    New York: Van Nostrand Reinhold Co., 1988

  2. Ferraiolo, David F. [Author]; Kuhn, D. Richard [Author]; Chandramouli, Ramaswamy [Author]

    Role-based access control

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Boston, Mass.; London: Artech House, 2003

    Published in: Artech House computer security series

  3. Prowell, Stacy J. [Author]; Kraus, Rob [Author]; Borkin, Mike [Author]

    Seven deadliest network attacks

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    Burlington, Mass.: Syngress, 2010

    Published in: The seven deadliest attacks series

  4. Noack, Claus [Author]; Hennig, Dietmar [Author] ; Dederichs, Jürgen [Other]

    Systemsicherheit unter UNIX

    Books
    Close

    Bookmarks

    You can manage bookmarks using lists, please log in to your user account for this.

    München [u.a.]: Hanser, 1990