//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Research Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Retain my current filters
~subject:"Computersicherheit"
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Scalable Role & Organization B...
Similar by subject
Narrow search
Delete all filters
| 1 applied filter
Year of publication
From:
To:
Subject
All
Computersicherheit
User access control
109
Zutrittskontrolle
109
Data security
61
Datensicherheit
61
IT crime
22
IT-Kriminalität
22
Zugriffskontrolle
19
Theorie
18
Theory
18
Access control
16
Biometrics
16
Datenschutz
16
Biometrie
15
Data protection
15
Access Control
14
United States
12
USA
11
Betriebliches Informationssystem
10
Internet
10
E-commerce
9
Electronic Commerce
9
Computer network
8
Computernetz
8
Identitätsverwaltung
8
Information management
8
Informationsmanagement
8
access control
8
Deutschland
7
Electronic Banking
7
Electronic banking
7
Germany
7
RBAC
7
Authentifikation
6
Cloud Computing
6
Datensicherung
6
Business intelligence system
5
Database
5
Engineering
5
Privacy
5
more ...
less ...
Type of publication
All
Book / Working Paper
5
Type of publication (narrower categories)
All
Dissertation u.a. Prüfungsschriften
1
Hochschulschrift
1
Thesis
1
Language
All
German
2
Undetermined
2
English
1
Author
All
Blake, Ian F.
1
Bowers, Dan M.
1
Eckert, Claudia
1
Füller, Marlon
1
Murhammer, Martin W.
1
Walker, Bruce James
1
Published in...
All
Berichte aus der Wirtschaftsinformatik
1
De Gruyter Oldenbourg Studium
1
Source
All
USB Cologne (EcoSocSci)
3
ECONIS (ZBW)
2
Showing
1
-
5
of
5
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
IT-Sicherheit : Konzepte - Verfahren - Protokolle
Eckert, Claudia
-
2018
-
10. Auflage
Persistent link: https://www.econbiz.de/10011821990
Saved in:
2
Methodenunterstützte Berechtigungsvergabe : Neugestaltung und Anpassung bestehender Berechtigungskonzepte auf Basis realer Anforderungen
Füller, Marlon
-
2013
-
1., Aufl
Persistent link: https://www.econbiz.de/10009722033
Saved in:
3
Computer security and protection structures
Walker, Bruce James
;
Blake, Ian F.
-
1977
Persistent link: https://www.econbiz.de/10004748370
Saved in:
4
Access control and personal identification systems
Bowers, Dan M.
-
1988
Persistent link: https://www.econbiz.de/10004066578
Saved in:
5
A comparison between smart cards and trusted platform modules in business scenarios
Murhammer, Martin W.
-
2008
Persistent link: https://www.econbiz.de/10004405803
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->