Skip to content
Scan a barcode
Scan
Paperback Role-Based Access Control, Second Edition Book

ISBN: 1596931132

ISBN13: 9781596931138

Role-Based Access Control, Second Edition

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: New

$116.20
Save $2.80!
List Price $119.00
50 Available
Ships within 2-3 days

Book Overview

Securing networked and Web-based systems can be costly because these open and easy-to-access systems leave a myriad of unwanted openings for hackers and other intruders to break into. Role-based... This description may be from another edition of this product.

Customer Reviews

1 rating

Most complete RBAC reference

The three authors are leaders in RBAC research and development, making this book one of the most authoritative and complete references to RBAC.Chapters 1 through 3 give a solid foundation for understanding RBAC and how it evolved, starting with an introduction, an exhaustive survey of access control methods needed to fully understand the evolution, and a solid and detailed overview of RBAC itself.In the subsequent chapters each aspect of RBAC is covered in depth. Topics include role hierarchies, separation of duty policies, administration, integrating RBAC into existing infrastructures, and migration to RBAC. In addition, there are chapters on related topics that give this book wide scope - "Using RBAC to Implement Military Policies" shows how to implement multi-level security models with RBAC. This information uses military policies, but the material is also of interest to any commercial organization seeking tightly integrated access controls and a high security posture. The chapter on the proposed NIST RBAC standard also covers key items of interest, including Common Criteria RBAC protection profiles and other conformance issues. There are also chapters on RBAC research and prototypes, and commercial products.While this book is well written and uses illustrations to impart key concepts, you will need to be conversant with set theory in order to get the most from it, as well as understand RBAC itself. If you are a bit rusty I recommend refreshing your skills before diving into this book.If you want to explore RBAC and the work of each of the authors visit NIST Computer Security Division and Computer Security Research by pasting the ASIN, B0001O48Y4, into the search box, selecting all products and clicking GO. Once you are on the site you'll find the RBAC section under Security Research/Emerging Technologies->Authorization Management and Advanced Access Control Models (AM & AACM) link.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured