AnyBook4Less.com
Find the Best Price on the Web
Order from a Major Online Bookstore
Developed by Fintix
Home  |  Store List  |  FAQ  |  Contact Us  |  
 
Ultimate Book Price Comparison Engine
Save Your Time And Money

Role-Based Access Control

Please fill out form in order to compare prices
Title: Role-Based Access Control
by David F. Ferraiolo, D. Richard Kuhn, Ramaswamy Chandramouli
ISBN: 1-58053-370-1
Publisher: Artech House Publishers
Pub. Date: 01 April, 2003
Format: Hardcover
Volumes: 1
List Price(USD): $85.32
Your Country
Currency
Delivery
Include Used Books
Are you a club member of: Barnes and Noble
Books A Million Chapters.Indigo.ca

Average Customer Rating: 5 (1 review)

Customer Reviews

Rating: 5
Summary: Most complete RBAC reference
Comment: The three authors are leaders in RBAC research and development, making this book one of the most authoritative and complete references to RBAC.

Chapters 1 through 3 give a solid foundation for understanding RBAC and how it evolved, starting with an introduction, an exhaustive survey of access control methods needed to fully understand the evolution, and a solid and detailed overview of RBAC itself.

In the subsequent chapters each aspect of RBAC is covered in depth. Topics include role hierarchies, separation of duty policies, administration, integrating RBAC into existing infrastructures, and migration to RBAC. In addition, there are chapters on related topics that give this book wide scope - "Using RBAC to Implement Military Policies" shows how to implement multi-level security models with RBAC. This information uses military policies, but the material is also of interest to any commercial organization seeking tightly integrated access controls and a high security posture. The chapter on the proposed NIST RBAC standard also covers key items of interest, including Common Criteria RBAC protection profiles and other conformance issues. There are also chapters on RBAC research and prototypes, and commercial products.

While this book is well written and uses illustrations to impart key concepts, you will need to be conversant with set theory in order to get the most from it, as well as understand RBAC itself. If you are a bit rusty I recommend refreshing your skills before diving into this book.

If you want to explore RBAC and the work of each of the authors visit NIST Computer Security Division and Computer Security Research by pasting the ASIN, B0001O48Y4, into the search box, selecting all products and clicking GO. Once you are on the site you'll find the RBAC section under Security Research/Emerging Technologies->Authorization Management and Advanced Access Control Models (AM&AACM) link.

Similar Books:

Title: Ldap Metadirectory Provisioning Methodology: A Step by Step Method to Implementing Ldap Based Metadirectory Provisioning & Identity Management Systems
by Marlin Pohlman
ISBN: 0595267262
Publisher: Writer's Showcase Press
Pub. Date: 01 March, 2003
List Price(USD): $35.95
Title: Designing Security Architecture Solutions
by Jay Ramachandran, Jay Ramachandran
ISBN: 0471206024
Publisher: Wiley
Pub. Date: 01 March, 2002
List Price(USD): $60.00
Title: Patterns of Enterprise Application Architecture
by Martin Fowler, David Rice, Matthew Foemmel, Edward Hieatt, Robert Mee, Randy Stafford
ISBN: 0321127420
Publisher: Addison-Wesley Pub Co
Pub. Date: 05 November, 2002
List Price(USD): $49.99
Title: Exploiting Software: How to Break Code
by Greg Hoglund, Gary McGraw
ISBN: 0201786958
Publisher: Addison-Wesley Professional
Pub. Date: 01 February, 2004
List Price(USD): $49.99
Title: The Shellcoder's Handbook : Discovering and Exploiting Security Holes
by Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell
ISBN: 0764544683
Publisher: John Wiley & Sons
Pub. Date: 22 March, 2004
List Price(USD): $50.00

Thank you for visiting www.AnyBook4Less.com and enjoy your savings!

Copyright� 2001-2021 Send your comments

Powered by Apache