A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Security as a quality of service routing problem
CoNEXT '05 Proceedings of the 2005 ACM conference on Emerging network experiment and technology
Hi-index | 0.00 |
From the Publisher:What's the best way to ensure Internet security? With firewalls, And the best way to learn firewall installation and maintenance from A to Z is covered in this information-packed guide. The CD-ROM contains 20 firewall product demos and evaluations from such major vendors as Check Point, Sun, and IBM.