Government information -- Access controlSee also what's at your library, or elsewhere.
Broader terms:Narrower terms: |
Filed under: Government information -- Access control- Law, Liberty, and the Pursuit of Terrorism (Ann Arbor: University of Michigan Press, c2014), by Roger Douglas
- Open Government Data (revised June 2012), by Joshua Tauberer (illustrated HTML with commentary at opengovdata.io)
Filed under: Government information -- Access control -- United States
Filed under: Electronic government information -- Access control -- United States
Items below (if any) are from related and broader terms.
Filed under: Government information -- United States
Filed under: Government information -- United States -- Evaluation- Report on the Assessment Of Electronic Government Information Products (Washington: GPO, 1999), by Westat, Inc.
Filed under: Electronic government information -- United States -- Evaluation- Report on the Assessment Of Electronic Government Information Products (Washington: GPO, 1999), by Westat, Inc.
Filed under: Government information -- United States -- Popular worksFiled under: Government information -- United States -- StatesFiled under: Official secrets -- United States
Filed under: Defense information, Classified -- United StatesFiled under: Security classification (Government documents) -- United StatesFiled under: Proclamations -- United States
Filed under: Copyright -- Official information -- United StatesFiled under: Electronic government information
Filed under: Electronic government information -- Europe -- Periodicals
Filed under: Electronic government information -- Information services -- ManagementFiled under: Exchange of government information
Filed under: Proclamations
Filed under: Proclamations -- Haiti
Filed under: Computer networks -- Access control
Filed under: Computer networks -- Access control -- United StatesFiled under: Computers -- Access control- Access Denied: The Practice and Policy of Global Internet Filtering (Cambridge, MA and London: MIT Press, c2008), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites)
- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
- A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org)
- Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Cambridge, MA and London: MIT Press, c2010), ed. by Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain (PDF with commentary at MIT Press)
- A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org)
- Rating Maintenance Phase Program Document, by Tommy Hammer (HTML at usmc.mil)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Trusted UNIX Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX System, by National Computer Security Center (U.S.) (HTML at usmc.mil)
Filed under: Digital libraries -- Access control -- United StatesFiled under: Electronic information resources -- Access control
Filed under: Financial services industry -- Records and correspondence -- Access control -- Congresses
Filed under: Internet -- Access control -- United StatesFiled under: Medical records -- Access control
Filed under: Medical records -- Access control -- United StatesMore items available under broader and related terms at left. |