| 000 | 01865 a2200421 4500 | ||
|---|---|---|---|
| 001 | 72704 | ||
| 650 |
_921391 _aComputer networks _xAccess control |
||
| 650 |
_92127 _aManagement information systems |
||
| 999 |
_c72704 _d25275 |
||
| 003 | TR-AnTOB | ||
| 005 | 20210305103122.0 | ||
| 008 | 080229s2008 mauad b 001 0 eng | ||
| 010 | _a2008270416 | ||
| 020 | _a9781596932180 | ||
| 020 | _a159693218X | ||
| 035 | _a72704 | ||
| 040 |
_aDLC _cDLC |
||
| 041 | _aeng | ||
| 050 |
_aT58.64 _b.C69 2008 |
||
| 090 | _aT58.64 .C69 2008 | ||
| 100 |
_aCoyne, Edward J., _cPhD. _949517 |
||
| 245 | 0 |
_aRole engineering for enterprise security management / _cEdward J. Coyne, John M. Davis. |
|
| 264 | 1 |
_aBoston : _bArtech House, _c2008. |
|
| 300 |
_axvii, 224 p. : _bill., charts ; _c24 cm. |
||
| 490 | 0 | _aArtech House information security and privacy series | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | _aThe business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why? | ||
| 650 | 0 |
_aYönetim bilgi sistemleri _979895 |
|
| 650 |
_aBilgisayar ağları _xErişim denetimi _921390 |
||
| 650 |
_aComputer network architectures _91076 |
||
| 650 |
_aBilgisayar ağ mimarileri _91075 |
||
| 650 |
_aInformation resources management _92135 |
||
| 650 |
_aBilgi kaynakları yönetimi _931372 |
||
| 700 |
_aDavis, John M. _949518 |
||
| 902 | _a0026807 | ||
| 903 | _aMerkez Kütüphane | ||
| 945 | _aBS | ||
| 942 | _cBK | ||