Report on the Feasibility of Integrating Physical Security Access with an existing IT Network
暂无分享,去创建一个
[1] Rolf Oppliger,et al. Internet And Intranet Security , 1998 .
[2] Brian Arkills. LDAP Directories Explained: An Introduction and Analysis , 2003 .
[3] Keith W. Ross,et al. Computer networking - a top-down approach featuring the internet , 2000 .
[4] David G. Alciatore,et al. Introduction To Mechatronics And Measurement Systems , 1998 .
[5] Klaus Finkenzeller,et al. Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.
[6] Arthur A. Thompson,et al. Strategic Management , 1990 .
[7] Robbie Allen,et al. Active Directory , 2018, Windows PowerShell 5 und PowerShell 7.
[8] J. Woodward,et al. Biometrics: A Look at Facial Recognition , 2003 .
[9] Julian Ashbourn,et al. Biometrics: Advanced Identity Verification , 2000, Springer London.
[10] Rick Krohn,et al. RFID: it's about more than asset tracking. , 2005, Journal of healthcare information management : JHIM.
[11] Rolf Oppliger,et al. Security Technologies for the World Wide Web , 2000 .
[12] Shaohua Zhou,et al. Unconstrained Face Recognition , 2005 .
[13] Jim Kurose,et al. Study companion, Computer networking, a top-down approach featuring the Internet, third edition, James F. Kurose, Keith W. Ross , 2007 .
[14] M. W. Simons,et al. The Building Regulations Explained and Illustrated , 1990 .
[15] Rolf Oppliger,et al. Authentication systems for secure networks , 1996 .
[16] Marcus Goncalves. Firewalls Complete , 1998 .
[17] Peter Williams,et al. Digital Certificates: Applied Internet Security , 1998 .
[18] R. Priest. Data Protection Act , 1988 .