Skip to:
Search Results
|
Content
|
Bottom
|
Search Facets
Log In
|
My Account
|
My Lists
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
E-Book
Journals
Beytepe Library
Health Sciences Library
Conservatory Library
Law Library
Social Sciences Vocational High School
DVD Collection
Prof.Dr. Onur Bilge Kula Collection
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
ISSN
13
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Author
Include
Exclude
SpringerLink (Online service)
(4)
Carafano, James Jay, 1955-
(2)
Project Muse.
(2)
Shimonski, Robert.
(2)
ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.)
(1)
Akujuobi, Cajetan M.
(1)
Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.
(1)
Battou, Abdella.
(1)
Bodhi, Priyantha. editor.
(1)
Bolt, Steven.
(1)
Borkin, Mike.
(1)
Casselman, Brian.
(1)
Chadha, Ritu, 1964-
(1)
Cole, Eric.
(1)
Deal, Richard A.
(1)
Du, Yingzi, 1975-
(1)
Elleithy, Khaled. editor.
(1)
Fichera, Joe, 1966-
(1)
Guizani, Mohsen.
(1)
Idrissi, Abdellah. editor.
(1)
Kant, Lahta, 1962-
(1)
Kaplan, Steve, 1955-
(1)
Kotwica, Kathleen.
(1)
Kraus, Rob.
(1)
Longfei, Shangguan. editor.
(1)
Miller, Drew, 1978-
(1)
Monti, Andrea, 1967- author.
(1)
Oriyano, Sean-Philip.
(1)
Prowell, Stacy J.
(1)
Reeser, Tim.
(1)
Regnault, John, ed.
(1)
Rountree, Derrick.
(1)
Sadiku, Matthew N.
(1)
Sobh, Tarek. editor.
(1)
Tam, Kenneth.
(1)
Temple, Robert, ed.
(1)
Tucker, Allen B.
(1)
Wacks, Raymond, author.
(1)
Wong, W. Eric. editor.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(24)
Publication Date
Include
Exclude
-
2012
(5)
2013
(4)
2002
(2)
2008
(2)
2011
(2)
2015
(2)
2023
(2)
2001
(1)
2003
(1)
2004
(1)
2005
(1)
2010
(1)
2022
(1)
More
View All
Fewer
Collapse All
Subject
Include
Exclude
Computer networks -- Access control.
(12)
Computer networks -- Security measures.
(9)
Computer crimes.
(3)
Biometric identification.
(2)
Computer networks -- Access control
(2)
Computer networks--Access control.
(2)
Electronic books.
(2)
Information society -- Political aspects.
(2)
Information technology -- Social aspects.
(2)
Information warfare -- Political aspects.
(2)
Internet and terrorism.
(2)
Social media.
(2)
Social networks.
(2)
Telecommunication--Security measures.
(2)
Virtual computer systems.
(2)
War and society.
(2)
Ad hoc networks (Computer networks) -- Access control.
(1)
Ad hoc networks (Computer networks) -- Management.
(1)
Artificial intelligence.
(1)
Business and politics -- United States -- Case studies.
(1)
BİLGİSAYAR AĞLARI -- ERİŞİM DENETİMİ -- KONGRELER.
(1)
BİLGİSAYAR GÜVENLİĞİ -- KONGRELER.
(1)
BİLGİSAYARLAR -- ERİŞİM DENETİMİ -- KONGRELER.
(1)
Cisco IOS.
(1)
Citrix XenApp.
(1)
Client/server computing.
(1)
Communications Engineering, Networks.
(1)
Computational intelligence.
(1)
Computer Communication Networks.
(1)
Computer crimes -- Investigation.
(1)
Computer input-output equipment.
(1)
Computer network protocols.
(1)
Computer networks -- Access control -- Congresses.
(1)
Computer networks -- Access control -- Handbooks, manuals, etc.
(1)
Computer networks -- Remote access.
(1)
Computer networks -- Security measures -- Government policy -- United States.
(1)
Computer networks -- Security measures -- Handbooks, manuals, etc.
(1)
Computer networks--Security measures.
(1)
Computer networks.
(1)
Computer networks .
(1)
Computer science -- Handbooks, manuals, etc.
(1)
Computer security -- Congresses.
(1)
Computer security -- Handbooks, manuals, etc.
(1)
Computer security.
(1)
Computers -- Access control -- Congresses.
(1)
Computers -- Access control.
(1)
Cyberinfrastructure -- Security measures -- Government policy -- United States.
(1)
Data Engineering.
(1)
Digital computer simulation.
(1)
Digital subscriber lines.
(1)
Electronic Circuits and Systems.
(1)
Electronic circuits.
(1)
Electronics and Microelectronics, Instrumentation.
(1)
Electronics.
(1)
Engineering -- Data processing.
(1)
Engineering -- Handbooks, manuals, etc.
(1)
Extranets (Computer networks)
(1)
Fault tolerance (Engineering).
(1)
Firewalls (Computer security)
(1)
Human-computer interaction.
(1)
Identification -- Automation.
(1)
Information retrieval.
(1)
Information technology -- Management.
(1)
Information technology -- Security measures.
(1)
Integrated services digital networks.
(1)
Intelligence service -- Information resources management -- United States.
(1)
Internet -- Security measures.
(1)
Internet.
(1)
Intranets (Computer networks).
(1)
Law enforcement -- Information resources management -- United States.
(1)
Mobile computing.
(1)
Modems.
(1)
Multimedia systems.
(1)
National security -- Law and legislation -- United States.
(1)
Optical communications.
(1)
POLITICAL SCIENCE / Public Policy / General
(1)
POLITICAL SCIENCE / Public Policy / Social Policy
(1)
Packet switching (Data transmission)
(1)
Pattern recognition systems.
(1)
Personal communication service systems.
(1)
Private security services.
(1)
Programming languages (Electronic computers).
(1)
Public administration -- Information resources management -- United States.
(1)
Public key cryptography.
(1)
Routing (Computer network management)
(1)
SONET (Data transmission).
(1)
Signal processing.
(1)
Signal, Speech and Image Processing.
(1)
Software configuration management.
(1)
Telecommunication systems--Management.
(1)
Telecommunication--Equipment and supplies.
(1)
Telecommunication.
(1)
Virtual reality.
(1)
Web applications.
(1)
Wide area networks (Computer networks) -- Access.
(1)
XML (Document markup language).
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
Book
E-Book
Shelf Location
Include
Exclude
Beytepe General Collection
CRC Ebooks
Electronic Library
Taylor Francis E-Book Collection
Library
Include
Exclude
Beytepe Library
Online Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
25 Results Found
1
2
3
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
25.
Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA
Proceedings of Sixth ACM Symposium on Access Control Models and Technologies : SACMAT 2001 : Litton-TASC, Westfields II Conference Facility, May 3-4, 2001, Chantilly, Virginia, USA
Author
ACM Symposium on Access Control Models and Technologies (6th : 2001 : Chantilly, V.A.) Association for Computing Machinery. Special Interest Group on Security, Audit, and Control.
Preferred Shelf Number
QA 76.9.A25 A292 2001
Format:
Availability
Beytepe Library~1
Available:
Copies:
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
2
3
Go to:
Search Results
|
Top of Page
|
Search Facets