Image from Google Jackets

Role engineering for enterprise security management / Edward J. Coyne, John M. Davis.

By: Coyne, Edward J, 1930-Contributor(s): Davis, John MMaterial type: TextTextSeries: Artech House information security and privacy seriesPublication details: Boston, Mass. ; London : Artech House, c2008Description: xvii, 224 p. : illISBN: 9781596932197 (ebook)Subject(s): Computers -- Access control | Business enterprises -- Computer networks -- Security measures | Computer security | Computers and ITGenre/Form: Online access: Click here to access online Also available in printed form ISBN 9781596932180Summary: Role engineering secures information systems. It ensures that every user has the right permission to access just the right information, computers, and networks. This book illustrates the entire role engineering process, from project planning to deployment and verification. It also shows how to verify that roles comply with security policies.
Holdings
Item type Current library Home library Class number Status Date due Barcode Item reservations
E-book E-book Electronic publication Electronic publication Available
Total reservations: 0

Includes bibliographical references (p. 213-216) and index.

Role engineering secures information systems. It ensures that every user has the right permission to access just the right information, computers, and networks. This book illustrates the entire role engineering process, from project planning to deployment and verification. It also shows how to verify that roles comply with security policies.

Also available in printed form ISBN 9781596932180

Electronic reproduction. Askews and Holts. Mode of access: World Wide Web.

There are no comments on this title.

to post a comment.