<?xml version="1.0" encoding="utf-8" ?> <rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"> <channel> <title> <![CDATA[Delhi University Library System Search for 'su:{ Role based access control}']]> </title> <!-- prettier-ignore-start --> <link> /cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Role%20based%20access%20control%7D&#38;sort_by=title_asc&#38;format=rss </link> <!-- prettier-ignore-end --> <atom:link rel="self" type="application/rss+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Role%20based%20access%20control%7D&#38;sort_by=title_asc&#38;format=rss" /> <description> <![CDATA[ Search results for 'su:{ Role based access control}' at Delhi University Library System]]> </description> <opensearch:totalResults>6</opensearch:totalResults> <opensearch:startIndex>0</opensearch:startIndex> <opensearch:itemsPerPage>50</opensearch:itemsPerPage> <atom:link rel="search" type="application/opensearchdescription+xml" href="/cgi-bin/koha/opac-search.pl?idx=&#38;q=su%3A%7B%20Role%20based%20access%20control%7D&#38;sort_by=title_asc&#38;format=opensearchdescription" /> <opensearch:Query role="request" searchTerms="idx%3D%26q%3Dsu%253A%257B%2520Role%2520based%2520access%2520control%257D" startPage="" /> <item> <title> Role engineering for enterprise security management </title> <dc:identifier>ISBN:9781596932180 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=27411</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/159693218X.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Coyne Edwrad J.<br /> Boston Artech House 2008 .<br /> xvii, 224p. , Includes bibliographical references.; Bibliography 213-216p.; Index 221-224p. cm..<br /> 9781596932180 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=27411">Place hold on <em>Role engineering for enterprise security management</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=27411</guid> </item> <item> <title> Role Mining in Business: Taming Role-Based Access Control Administration </title> <dc:identifier>ISBN:9789814366151</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1543425</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/9814366153.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Di Pietro Roberto Et Al.<br /> World Scientific | WSPC 2012 9789814366151 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1543425">Place hold on <em>Role Mining in Business: Taming Role-Based Access Control Administration</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1543425</guid> </item> <item> <title> Role-based access control </title> <dc:identifier>ISBN:1580533701 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=44725</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1580533701.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ferraiolo David F.<br /> Boston Artech House 2003 .<br /> xvii, 316p. , Includes bibliographical references; Appendix A-B 295-301p. cm..<br /> 1580533701 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=44725">Place hold on <em>Role-based access control</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=44725</guid> </item> <item> <title> Role-based access control </title> <dc:identifier>ISBN:9781596931138 (hbd)</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=25418</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <img src="https://images-na.ssl-images-amazon.com/images/P/1596931132.01.TZZZZZZZ.jpg" alt="" /> ]]> <![CDATA[ <p> By Ferraiolo David F.<br /> Norwood Artech House 2007 .<br /> xix, 381p. , Includes bibliographical references.; Appendix A-B, 361-367p.; Index 371-381p. cm..<br /> 9781596931138 (hbd) </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=25418">Place hold on <em>Role-based access control</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=25418</guid> </item> <item> <title> Role-Based Access Control </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1717838</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Ferraiolo.<br /> IEEE 2003 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1717838">Place hold on <em>Role-Based Access Control</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1717838</guid> </item> <item> <title> Role-Based Access Control, Second Edition </title> <dc:identifier>ISBN:</dc:identifier> <!-- prettier-ignore-start --> <link>/cgi-bin/koha/opac-detail.pl?biblionumber=1717839</link> <!-- prettier-ignore-end --> <description> <![CDATA[ <p> By Chandramouli.<br /> IEEE 2007 </p> ]]> <![CDATA[ <p> <a href="/cgi-bin/koha/opac-reserve.pl?biblionumber=1717839">Place hold on <em>Role-Based Access Control, Second Edition</em></a> </p> ]]> </description> <guid>/cgi-bin/koha/opac-detail.pl?biblionumber=1717839</guid> </item> </channel> </rss>
