The Resource Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book)
Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book)
Resource Information
The item Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.
This item is available to borrow from 1 library branch.
- Language
- eng
- Extent
- xvii, 224 p.
- Contents
-
- The business case for role-based access control
- Role engineering in the phases of the system development life cycle
- Role engineering and why we need it
- Defining good roles
- The role engineering process
- Designing the roles
- Engineering the permissions
- Tools that can be used to assist the role engineering process
- Putting it all together : the role formation process
- What others have been doing
- Planning a role engineering effort
- Staffing for role engineering
- What can go wrong and why?
- Isbn
- 9781596932180
- Label
- Role engineering for enterprise security management
- Title
- Role engineering for enterprise security management
- Statement of responsibility
- Edward J. Coyne, John M. Davis
- Language
- eng
- Cataloging source
- CaPaEBR
- http://library.link/vocab/creatorName
- Coyne, Edward J.
- Illustrations
-
- illustrations
- charts
- Index
- index present
- LC call number
- T58.64
- LC item number
- .C69 2008eb
- Literary form
- non fiction
- Nature of contents
-
- standards specifications
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Davis, John M.
- http://library.link/vocab/subjectName
-
- Information resources management
- Computer networks
- Computer network architectures
- Management information systems
- Label
- Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
- Control code
- ebr10240780
- Dimensions
- 24 cm.
- Dimensions
- unknown
- Extent
- xvii, 224 p.
- Form of item
- electronic
- Isbn
- 9781596932180
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Original version note
- Original electronic resource
- Other physical details
- ill., charts
- Reproduction note
- Electronic resource.
- Specific material designation
- remote
- Label
- Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- The business case for role-based access control -- Role engineering in the phases of the system development life cycle -- Role engineering and why we need it -- Defining good roles -- The role engineering process -- Designing the roles -- Engineering the permissions -- Tools that can be used to assist the role engineering process -- Putting it all together : the role formation process -- What others have been doing -- Planning a role engineering effort -- Staffing for role engineering -- What can go wrong and why?
- Control code
- ebr10240780
- Dimensions
- 24 cm.
- Dimensions
- unknown
- Extent
- xvii, 224 p.
- Form of item
- electronic
- Isbn
- 9781596932180
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Original version note
- Original electronic resource
- Other physical details
- ill., charts
- Reproduction note
- Electronic resource.
- Specific material designation
- remote
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Role-engineering-for-enterprise-security/LiOtQLr6Y68/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Role-engineering-for-enterprise-security/LiOtQLr6Y68/">Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Role-engineering-for-enterprise-security/LiOtQLr6Y68/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Role-engineering-for-enterprise-security/LiOtQLr6Y68/">Role engineering for enterprise security management, Edward J. Coyne, John M. Davis, (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>