Search

Your search keyword '"COMPUTER access control software"' showing total 397 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER access control software" Remove constraint Descriptor: "COMPUTER access control software"
397 results on '"COMPUTER access control software"'

Search Results

101. Software Application for Storage Devices Data Protection.

102. Sistema de control de acceso e interbloqueo para el Centro de Inmunología Molecular.

103. Key Management for Multiple Multicast Groups in Wireless Networks.

104. Modelling Access Propagation in Dynamic Systems.

105. Employing UML and OCL for designing and analysing role-based access control.

106. Link-Utility-Based Improved Backoff Cooperative MAC Protocol for MANET.

107. On optimal cryptographic key derivation.

108. ACCESS CONTROL FOR SHARED ONTOLOGIES.

109. Electronic Wallet and Access Control Solution Based on RFID MiFare Cards.

110. Novel Design and Analysis of Aggregated ARQ Protocols for IEEE 802.11n Networks.

111. MODELOVANJE KONTROLE PRISTUPA.

112. An Improved Contention Access Mechanism for FPRP to Increase Throughput.

113. Formal specification and management of security policies with collective group obligations.

114. Modeling access control for cyber-physical systems using reputation

115. A Framework to Improve Virtual Private Network Architecture for Secure Data Transmission Using CMT-PA and Multi-Homing.

116. XML Access Control Models and Mechanisms: a Survey.

117. Access Control on Grid Resources Using Radial Basis Function Neural Network.

118. Delay Prediction in Mobile Ad Hoc Network using Artificial Neural Network.

119. VIDEO SURVEILLANCE.

120. ProxPlus Secure Card Readers from DoorKing: ProxPlus Secure cards are programmed with a unique identifier, making them extremely secure and difficult to duplicate.

121. BEST OF IDENTITY AND ACCESS MANAGEMENT 2014.

122. NAC, IDM, DLP.

123. Gearing up for Tomorrow's Threats.

124. 6 cures for the storage system blues.

125. DB2 Linux Style for i Data Access.

126. Trends in Access Control Software: Software and the cloud have made access control more powerful, versatile and affordable than ever.

127. Performance analysis of a k-round contention resolution scheme for WLANs.

128. TECH BRIEFS.

129. Fault Comprehension for Concurrent Programs.

130. Implement Kerberos Delegation with SSRS.

131. Mac-to-AD Integration Solutions.

132. Controlling your data.

133. IDENTITY LIFECYCLE MANAGER 2007.

134. NEW PRODUCTS.

135. Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities.

136. Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things.

139. Pushing the Perimeter.

141. Remote access apps.

142. Globally Distributed Pendulum Experiment as an Educational Resource on e-lab.

143. Security and Privacy Enhancing For Dynamic Groups in the Cloud Using Batch Auditing.

144. Software Firm Brivo Nears SPAC Deal With Crown PropTech.

145. A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.

146. RFID Based Access Control Using Arduino.

147. MARKETPLACE.

Catalog

Books, media, physical & digital resources