Report on the Feasibility of Integrating Physical Security Access with an existing IT Network

[1]  Rolf Oppliger,et al.  Internet And Intranet Security , 1998 .

[2]  Brian Arkills LDAP Directories Explained: An Introduction and Analysis , 2003 .

[3]  Keith W. Ross,et al.  Computer networking - a top-down approach featuring the internet , 2000 .

[4]  David G. Alciatore,et al.  Introduction To Mechatronics And Measurement Systems , 1998 .

[5]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[6]  Arthur A. Thompson,et al.  Strategic Management , 1990 .

[7]  Robbie Allen,et al.  Active Directory , 2018, Windows PowerShell 5 und PowerShell 7.

[8]  J. Woodward,et al.  Biometrics: A Look at Facial Recognition , 2003 .

[9]  Julian Ashbourn,et al.  Biometrics: Advanced Identity Verification , 2000, Springer London.

[10]  Rick Krohn,et al.  RFID: it's about more than asset tracking. , 2005, Journal of healthcare information management : JHIM.

[11]  Rolf Oppliger,et al.  Security Technologies for the World Wide Web , 2000 .

[12]  Shaohua Zhou,et al.  Unconstrained Face Recognition , 2005 .

[13]  Jim Kurose,et al.  Study companion, Computer networking, a top-down approach featuring the Internet, third edition, James F. Kurose, Keith W. Ross , 2007 .

[14]  M. W. Simons,et al.  The Building Regulations Explained and Illustrated , 1990 .

[15]  Rolf Oppliger,et al.  Authentication systems for secure networks , 1996 .

[16]  Marcus Goncalves Firewalls Complete , 1998 .

[17]  Peter Williams,et al.  Digital Certificates: Applied Internet Security , 1998 .

[18]  R. Priest Data Protection Act , 1988 .