000 01865 a2200421 4500
001 72704
650 _921391
_aComputer networks
_xAccess control
650 _92127
_aManagement information systems
999 _c72704
_d25275
003 TR-AnTOB
005 20210305103122.0
008 080229s2008 mauad b 001 0 eng
010 _a2008270416
020 _a9781596932180
020 _a159693218X
035 _a72704
040 _aDLC
_cDLC
041 _aeng
050 _aT58.64
_b.C69 2008
090 _aT58.64 .C69 2008
100 _aCoyne, Edward J.,
_cPhD.
_949517
245 0 _aRole engineering for enterprise security management /
_cEdward J. Coyne, John M. Davis.
264 1 _aBoston :
_bArtech House,
_c2008.
300 _axvii, 224 p. :
_bill., charts ;
_c24 cm.
490 0 _aArtech House information security and privacy series
504 _aIncludes bibliographical references and index.
505 _aThe business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
650 0 _aYönetim bilgi sistemleri
_979895
650 _aBilgisayar ağları
_xErişim denetimi
_921390
650 _aComputer network architectures
_91076
650 _aBilgisayar ağ mimarileri
_91075
650 _aInformation resources management
_92135
650 _aBilgi kaynakları yönetimi
_931372
700 _aDavis, John M.
_949518
902 _a0026807
903 _aMerkez Kütüphane
945 _aBS
942 _cBK