Welcome to Boeklezers.nl

Boeklezers.nl is a network for social reading. We help readers discover new books and authors, and bring readers in contact with each other and with writers. Read more ».

Sign Up

Books

The Business Case for Role-Based Access Control
The Business Case for Role-Based Access Control
Chapter 2 from Role Engineering for Enterprise Security Management »
 
 
 
 
 

What Can Go Wrong and Why?
What Can Go Wrong and Why?
Chapter 14 from Role Engineering for Enterprise Security Management »
 
 
 
 
 

Engineering the Permissions
Engineering the Permissions
Chapter 8 from Role Engineering for Enterprise Security Management »
 
 
 
 
 

Tools That Can Be Used to Assist the Role Engineering Process
Tools That Can Be Used to Assist the Role Engineering Process
Chapter 9 from Role Engineering for Enterprise Security Management »
 
 
 
 
 

What Others Have Been Doing
What Others Have Been Doing
Chapter 11 from Role Engineering for Enterprise Security Management »
 
 
 
 
 

Role Engineering in the Phases of the System Development Life Cycle
Role Engineering in the Phases of the System Development Life Cycle
Chapter 3 from Role Engineering for Enterprise Security Management »
 
 
 
 
 

Role Engineering for Enterprise Security Management
Role Engineering for Enterprise Security Management
Role Engineering for Enterprise Security Management »
 
 
 
 
 

Staffing for Role Engineering
Staffing for Role Engineering
Chapter 13 from Role Engineering for Enterprise Security Management »
 
 
 
 
 

Introduction
Introduction
Chapter 1 from Role Engineering for Enterprise Security Management »