000 | 01865 a2200421 4500 | ||
---|---|---|---|
001 | 72704 | ||
650 |
_921391 _aComputer networks _xAccess control |
||
650 |
_92127 _aManagement information systems |
||
999 |
_c72704 _d25275 |
||
003 | TR-AnTOB | ||
005 | 20210305103122.0 | ||
008 | 080229s2008 mauad b 001 0 eng | ||
010 | _a2008270416 | ||
020 | _a9781596932180 | ||
020 | _a159693218X | ||
035 | _a72704 | ||
040 |
_aDLC _cDLC |
||
041 | _aeng | ||
050 |
_aT58.64 _b.C69 2008 |
||
090 | _aT58.64 .C69 2008 | ||
100 |
_aCoyne, Edward J., _cPhD. _949517 |
||
245 | 0 |
_aRole engineering for enterprise security management / _cEdward J. Coyne, John M. Davis. |
|
264 | 1 |
_aBoston : _bArtech House, _c2008. |
|
300 |
_axvii, 224 p. : _bill., charts ; _c24 cm. |
||
490 | 0 | _aArtech House information security and privacy series | |
504 | _aIncludes bibliographical references and index. | ||
505 | _aThe business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why? | ||
650 | 0 |
_aYönetim bilgi sistemleri _979895 |
|
650 |
_aBilgisayar ağları _xErişim denetimi _921390 |
||
650 |
_aComputer network architectures _91076 |
||
650 |
_aBilgisayar ağ mimarileri _91075 |
||
650 |
_aInformation resources management _92135 |
||
650 |
_aBilgi kaynakları yönetimi _931372 |
||
700 |
_aDavis, John M. _949518 |
||
902 | _a0026807 | ||
903 | _aMerkez Kütüphane | ||
945 | _aBS | ||
942 | _cBK |