|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn247014336 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
080909s2008 mauad ob 001 0 eng d |
010 |
|
|
|z 2008270416
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d YDXCP
|d VGM
|d OCLCQ
|d TUU
|d OCLCQ
|d OCLCF
|d OCLCO
|d NLGGC
|d OCLCO
|d MERUC
|d CCO
|d E7B
|d OSU
|d QE2
|d EBLCP
|d DEBSZ
|d FVL
|d B24X7
|d OCLCQ
|d OCLCO
|d OCLCQ
|d AZK
|d LOA
|d JBG
|d CNNOR
|d PIFAG
|d ZCU
|d LIV
|d OCLCQ
|d WY@
|d U3W
|d LUE
|d BRL
|d STF
|d WRM
|d OCLCQ
|d VTS
|d XOS
|d NRAMU
|d AGLDB
|d ICG
|d OCLCQ
|d INT
|d VT2
|d CUY
|d AU@
|d COO
|d OCLCQ
|d WYU
|d A6Q
|d OCLCQ
|d DKC
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d UKCRE
|d BRF
|d OCLCO
|d OCLCQ
|d ANO
|d OCLCQ
|d INARC
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 316324605
|a 471136163
|a 560506562
|a 646757784
|a 722682039
|a 728053969
|a 765143065
|a 961592562
|a 962565040
|a 966264821
|a 992031691
|a 992038021
|a 1037514759
|a 1038687462
|a 1045465570
|a 1055404082
|a 1058537311
|a 1064112346
|a 1076314984
|a 1081288253
|a 1153518785
|a 1228563325
|a 1359393547
|
020 |
|
|
|a 9781596932197
|q (electronic bk.)
|
020 |
|
|
|a 1596932198
|q (electronic bk.)
|
020 |
|
|
|z 9781596932180
|
020 |
|
|
|z 159693218X
|
029 |
1 |
|
|a AU@
|b 000051409333
|
029 |
1 |
|
|a DEBBG
|b BV043163802
|
029 |
1 |
|
|a DEBBG
|b BV044129192
|
029 |
1 |
|
|a DEBSZ
|b 396172520
|
029 |
1 |
|
|a DEBSZ
|b 422136026
|
029 |
1 |
|
|a GBVCP
|b 802647448
|
029 |
1 |
|
|a NZ1
|b 14240672
|
035 |
|
|
|a (OCoLC)247014336
|z (OCoLC)316324605
|z (OCoLC)471136163
|z (OCoLC)560506562
|z (OCoLC)646757784
|z (OCoLC)722682039
|z (OCoLC)728053969
|z (OCoLC)765143065
|z (OCoLC)961592562
|z (OCoLC)962565040
|z (OCoLC)966264821
|z (OCoLC)992031691
|z (OCoLC)992038021
|z (OCoLC)1037514759
|z (OCoLC)1038687462
|z (OCoLC)1045465570
|z (OCoLC)1055404082
|z (OCoLC)1058537311
|z (OCoLC)1064112346
|z (OCoLC)1076314984
|z (OCoLC)1081288253
|z (OCoLC)1153518785
|z (OCoLC)1228563325
|z (OCoLC)1359393547
|
050 |
|
4 |
|a T58.64
|b .C69 2008eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Coyne, Edward J.,
|c PhD.
|1 https://id.oclc.org/worldcat/entity/E39PCjJYhWxJVYgTKMvxGjB3wC
|
245 |
1 |
0 |
|a Role engineering for enterprise security management /
|c Edward J. Coyne, John M. Davis.
|
260 |
|
|
|a Boston :
|b Artech House,
|c 2008.
|
300 |
|
|
|a 1 online resource (xvii, 224 pages) :
|b illustrations, charts
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Artech House information security and privacy series
|
505 |
0 |
|
|a The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
520 |
3 |
|
|a Whether you are a manager, engineer, or IT security specialist, this authoritative resource shows you how to define and deploy roles for securing enterprise systems.
|c Publisher abstract.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Information resources management.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
0 |
|a Computer network architectures.
|
650 |
|
0 |
|a Management information systems.
|
650 |
|
6 |
|a Gestion de l'information.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Architectures.
|
650 |
|
6 |
|a Systèmes d'information de gestion.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer network architectures
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Access control
|2 fast
|
650 |
|
7 |
|a Information resources management
|2 fast
|
650 |
|
7 |
|a Management information systems
|2 fast
|
700 |
1 |
|
|a Davis, John M.
|q (John Mike)
|1 https://id.oclc.org/worldcat/entity/E39PCjGvHwVQkcgTFmP43qTGVy
|
758 |
|
|
|i has work:
|a Role engineering for enterprise security management (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFrVhVHWMjhTMBvFmDwvxP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Coyne, Edward J., PhD.
|t Role engineering for enterprise security management.
|d Boston : Artech House, 2008
|z 9781596932180
|z 159693218X
|w (DLC) 2008270416
|w (OCoLC)166379797
|
830 |
|
0 |
|a Artech House information security and privacy series.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=338774
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28882064
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00027209
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL338774
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 225202
|
938 |
|
|
|a IEEE
|b IEEE
|n 9100500
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2871280
|
938 |
|
|
|a Internet Archive
|b INAR
|n roleengineeringf0000coyn
|
994 |
|
|
|a 92
|b IZTAP
|