Library
Help
Personal Sign In
This Book
Security in
Computing, Fifth
Edition
Email
Print
Role-Based Access Control
This
Page
(Key:
e)
Search
Contents
Table of Contents
About This eBook
Title Page
Copyright Page
Dedication Page
Contents
Foreword
Preface
Acknowledgments
About the Authors
1. Introduction
2. Toolbox: Authentication,
Access Control, and
Cryptography
2.1 Authentication
2.2 Access Control
Access Policies
Implementing Access
Control
Procedure-Oriented Access
Control
Role-Based Access
Control
2.3 Cryptography
2.4 Exercises
3. Programs and
Programming
4. The WebUser Side
5. Operating Systems
Zoom
Zoom
Toggle to
OutIn Full
(Key:
(Key:
Screen
-) +) (Key: f)
6. Networks
7. Databases
8. Cloud Computing
9. Privacy
10. Management and
Incidents
11. Legal Issues and Ethics
12. Details of Cryptography
13. Emerging Topics
Bibliography
Index
Code Snippets
Previous
Next
(Key:
(Key:
p) n)
Email
Print
This
Page
(Key:
e)
Zoom
Zoom
Toggle to
OutIn Full
(Key:
(Key:
Screen
-) +) (Key: f)
Previous
Next
(Key:
(Key:
p) n)