Access controlSee also what's at Wikipedia, your library, or elsewhere.
Narrower terms: |
Filed under: Computer networks -- Access control
Filed under: Computer networks -- Access control -- United StatesFiled under: Computers -- Access control- Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites)
- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
- A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org)
- Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge, MA and London: MIT Press, c2010), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org)
- Rating Maintenance Phase Program Document, by Tommy Hammer (HTML at usmc.mil)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil)
Filed under: Computers -- Access control -- AsiaFiled under: Computers -- Access control -- Handbooks, manuals, etc.Filed under: Computers -- Access control -- PeriodicalsFiled under: Computers -- Access control -- United States- Information Security and Privacy in Network Environments (Washington: GPO, 1994), by United States Congress Office of Technology Assessment
- Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary
Filed under: Computers -- United States -- Access control
Filed under: Digital libraries -- Access control -- United States
Filed under: Electronic government information -- Access control -- United StatesFiled under: Electronic information resources -- Access control
Filed under: Financial services industry -- Records and correspondence -- Access control -- CongressesFiled under: Government information -- Access control- Law, Liberty, and the Pursuit of Terrorism (Ann Arbor: University of Michigan Press, c2014), by Roger Douglas
- Open Government Data (revised June 2012), by Joshua Tauberer (illustrated HTML with commentary at opengovdata.io)
Filed under: Government information -- Access control -- United States
Filed under: Internet -- Access control -- United StatesFiled under: Medical records -- Access control
Filed under: Medical records -- Access control -- United States
Filed under: Public records -- Access control -- United States
Filed under: Records -- Access control -- AustraliaFiled under: Records -- Access control -- New Zealand
Items below (if any) are from related and broader terms. |