1
Computers Access control -- See Also the narrower term Software protection Here are entered works on various techniques used to protect software against unauthorized use or duplication.
1
3
Computers -- Access control -- Code words. : Password & internet addresses journal for dummies / by Ryan C. Williams with Michael J. Arata, Jr. [and others]. [O'Reilly electronic resource]
2014
1
4
Computers -- Access control -- Computer simulation. : Multilevel modeling of secure systems in QoP-ML / author, Bogdan Ksiezopolski. [O'Reilly electronic resource]
2015
1
7
Computers -- Access control -- Handbooks, manuals, etc. : Information Security Management Handbook, Volume 6, 6th Edition / Tipton, Harold. [O'Reilly electronic resources]
2016
1
8
Computers -- Access control -- Keystroke timing authentication. : Two-factor authentication / Mark Stanislav. [O'Reilly electronic resource]
2015
1
9
Computers -- Access control -- Mathematics. : Public-key cryptography : theory and practice / Abhijit Das, C.E. Veni Madhavan. [O'Reilly electronic resource]
2009
1
11
Computers -- Access control -- Software. : Windows 7 : Application Compatibility / by Microsoft. [O'Reilly electronic resource]
2010
1
12
Computers -- Access control -- Study guides. : Certified ethical hacker boot camp. [O'Reilly electronic resource]
2023
1