Business > CASE STUDY > ISSC680 ProjectBibliography.docx ISSC680 Access Control Bibliography (Milestone 3) ISS (All)
ISSC680 ProjectBibliography.docx ISSC680 Access Control Bibliography (Milestone 3) ISSC680 Bibliography Ballad, B., Banks, E., & Ballad, T. (2010). Access Control, Authentication and Public Key ... Infrastructure (1st edition). Jones & Bartlett Publishers Incorporated. The authors of this work explore the access control framework; why there is a need for access controls, the consequences of having inadequate controls, using access controls to perform limited risk mitigation, and practical matters of implementing, testing, and managing access control systems. The information within this book will be used to help highlight the importance of access control. Ferraiolo, D., Kuhn, D. R., & Chandramouli, R. (2007). Role-Based Access Control (2nd Ed.). Boston, MA: Artech House. The authors of this work explore the functions of Role-Based Access Control, or RBAC. It is part of a series of computer security books, with this . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]
Last updated: 3 years ago
Preview 1 out of 4 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 22, 2021
Number of pages
4
Written in
All
This document has been written for:
Uploaded
Jul 22, 2021
Downloads
0
Views
43
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·