Access controlSee also what's at Wikipedia, your library, or elsewhere.
Narrower terms: |
Filed under: Archives -- Access control
Filed under: Computer networks -- Access control
Filed under: Computers -- Access control- Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites)
- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
- A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org)
- Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge, MA and London: MIT Press, c2010), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org)
- Rating Maintenance Phase Program Document, by Tommy Hammer (HTML at usmc.mil)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil)
- Department of Defense trusted computer system evaluation criteria. (Dept. of Defense, 1985), by United States Department of Defense (page images at HathiTrust)
- Computers : crimes, clues and controls ; a management guide (The Committee :, 1986), by President's Council on Integrity and Efficiency (U.S.). Prevention Committee (page images at HathiTrust)
- A Guide to understanding discretionary access control in trusted systems. (National Computer Security Center, 1989), by National Computer Security Center (U.S.) (page images at HathiTrust)
- Trusted UNIX Working Group (TRUSIX) rationale for selecting access control list features for the UNIX® system (The Center, 1990), by National Computer Security Center (U.S.) (page images at HathiTrust)
- Rating maintenance phase program document. (National Computer Security Center, 1989), by Tommy Hammer and National Computer Security Center (U.S.) (page images at HathiTrust; US access only)
- Computer Systems Protection act of 1979, S. 240 hearing before the Subcommittee on Criminal Justice of the Committee on the Judiciary, United States Senate, Ninety-sixth Congress, second session, on S. 240, February 28, 1980. (U.S. G.P.O., 1981), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Justice (page images at HathiTrust)
- Computer and communications security and privacy hearings before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science and Technology, U.S. House of Representatives, Ninety-eighth Congress, first session, September 26; October 17, 24, 1983. (U.S. G.P.O., 1983), by Aviation United States. Congress. House. Committee on Science and Technology. Subcommittee on Transportation (page images at HathiTrust)
- A guide to understanding identification and authentication in trusted systems. (National Computer Security Center, 1991), by James Anderson, Rayford Vaughn, and National Computer Security Center (U.S.) (page images at HathiTrust)
- Staff study of computer security in Federal programs (U.S. Govt. Print. Off., 1977), by United States Senate Committee on Government Operations (page images at HathiTrust)
- Computer crime : criminal justice. (Dept. of Justice, Law Enforcement Assistance Administration, National Criminal Justice Information and Statistics Service, 1979), by United States. National Criminal Justice Information and Statistics Service and SRI International (page images at HathiTrust)
- Report on nuclear industry quality assurance procedures for safety analysis computer code development and use (Office of Nuclear Reactor Regulation, U.S. Nuclear Regulatory Commission :, 1980), by B. Sheron, Z. R. Rosztoczy, and U.S. Nuclear Regulatory Commission Office of Nuclear Reactor Regulation (page images at HathiTrust)
- Access with trust. ([Washington, DC] : National Partnership for Reinventing Government, Vice President Al Gore, 1998), by Albert Gore, National Partnership for Reinventing Government (U.S.), United States. Office of Management and Budget, United States. Government Information Technology Services Board, and United States. Federal Public Key Infrastructure Steering Committee (page images at HathiTrust)
- Library public access workstation authentication (Association of Research Libraries, Office of Leadership and Management Services, 2003), by Lori Driscoll and Association of Research Libraries. Office of Leadership and Management Services (page images at HathiTrust; US access only)
- A review of network access techniques with a case study : the network access machine (U.S. Dept. of Commerce, National Bureau of Standards, Institute for Computer Sciences and Technology :, 1976), by Robert Rosenthal, United States. National Bureau of Standards, National Science Foundation (U.S.), and Institute for Computer Sciences and Technology (page images at HathiTrust)
- Wired China : who's hand is on the switch : roundtable before the Congressional-Executive Commission on China, One Hundred Seventh Congress, second session, April 15, 2002. (U.S. G.P.O. :, 2002), by United States Congressional-Executive Commission on China (page images at HathiTrust)
- Communications and computer surveillance, privacy, and security : hearing before the Subcommittee on Technology, Environment, and Aviation of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, second session, May 3, 1994. (U.S. G.P.O. :, 1994), by Space United States. Congress. House. Committee on Science (page images at HathiTrust)
- Design alternatives for computer network security. (National Bureau of Standards; for sale by the Supt. of Docs., U.S. Govt. Print. Off., 1977), by Gerald D. Cole, Dennis K. Branstad, and Institute for Computer Sciences and Technology (page images at HathiTrust; US access only)
- Computer Resource Management Technology Program (PE 6474OF). Task #9, Advanced user authentication. (U.S. Department of Transportation, Research and Special Programs Administration, Transportation Systems Center ;, 1988), by W. Barron, L. Watson, United States. Air Force. Systems Command. Electronic Systems Division, and Transportation Systems Center (page images at HathiTrust)
- Computer crime : computer security techniques. (U.S. Dept. of Justice, Bureau of Justice Statistics :, 1982), by SRI International and United States Bureau of Justice Statistics (page images at HathiTrust)
- Guideline on user authentication techniques for computer network access control : category, ADP operations; subcategory, computer security. (U.S. Dept. of Commerce, National Bureau of Standards ;, 1980), by United States. National Bureau of Standards (page images at HathiTrust)
- Guideline for computer security certification and accreditation : category, ADP operations, subcategory, computer security. (U.S. Dept. of Commerce, National Bureau of Standards ;, 1984), by United States. National Bureau of Standards (page images at HathiTrust)
- Information systems : agencies overlook security controls during development : report to the Chairman, Committee on Science, Space, and Technology, House of Representatives (The Office, 1988), by United States General Accounting Office (page images at HathiTrust)
- Computer security subsystem interpretation of the trusted computer system evaluation criteria (The Center ;, 1988), by National Computer Security Center (U.S.) (page images at HathiTrust)
- A guide to understanding trusted facility management. (National Computer Security Center ;, 1990), by Virgil D. Gligor and National Computer Security Center (U.S.) (page images at HathiTrust)
- Justice automation : tighter computer security needed : report to the chairman, Subcommittee on Government Information, Justice, and Agriculture, Committee on Government Operations, House of Representatives (U.S. General Accounting Office, 1990), by United States General Accounting Office and Justice United States. Congress. House. Committee on Government Operations. Government Information (page images at HathiTrust)
- Comprehensive security in data processing systems : the state of the art (Dept. of Computer Science, University of Illinois at Urbana-Champaign, 1975), by Enrique Grapa and University of Illinois at Urbana-Champaign. Dept. of Computer Science (page images at HathiTrust)
- Protecting the privacy of Illinois citizens : responding to Federal initiatives (Data Information Systems Commission, Illinois General Assembly, 1979), by Stanley L. Sokolik and Illinois. Data Information Systems Commission (page images at HathiTrust)
- Computer and communications security and privacy : hearings before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science and Technology, U.S. House of Representatives, Ninety-eighth Congress, first session, September 26; October 17, 24, 1983. (U.S. G.P.O., 1983), by Aviation United States. Congress. House. Committee on Science and Technology. Subcommittee on Transportation (page images at HathiTrust)
- Computer crime : criminal justice resource manual (Bureau of Justice Statistics, U.S. Dept. of Justice, 1980), by SRI International, United States. National Criminal Justice Information and Statistics Service, and United States Bureau of Justice Statistics (page images at HathiTrust)
- Guideline for automatic data processing risk analysis. ([Washington] : Dept. of Commerce, National Bureau of Standards, 1979., 1979), by United States. National Bureau of Standards (page images at HathiTrust)
- Computer crime and security ([Washington, D.C.] : The Library of Congress, Congressional Research Service, Major Issues System, [1980], 1980), by Louise Giovane Becker and Library of Congress. Congressional Research Service (page images at HathiTrust)
- Audit and evaluation of computer security : proceedings of the NBS invitational workshop held at Miami Beach, Florida, March 22-24, 1977 (Dept. of Commerce, National Bureau of Standards, Institute for Computer Sciences and Technology : for sale by the Supt. of Docs.,U.S. Govt. Print. Off., 1977), by Fla.) NBS Invitational Workshop on Audit and Evaluation of Computer Security (1977 : Miami Beach, Robert G. McKenzie, Zella G. Ruthberg, United States. National Bureau of Standards, United States General Accounting Office, and Institute for Computer Sciences and Technology (page images at HathiTrust)
- VA's new computer system has potential to protect privacy of individuals claiming benefits : report (General Accounting Office, 1978), by United States General Accounting Office (page images at HathiTrust)
- Computers, crimes, clues and controls (The Council?, 1986), by President's Council on Integrity and Efficiency (U.S.). Prevention Committee (page images at HathiTrust)
Filed under: Electronic information resources -- Access control
More items available under narrower terms. |