LEADER 02702nam 2200613 a 450 001 9910791961403321 005 20230725021454.0 010 $a6613433071 010 $a1-283-43307-9 010 $a9786613433077 010 $a1-60750-970-9 035 $a(CKB)2560000000079563 035 $a(EBL)836214 035 $a(OCoLC)772636241 035 $a(SSID)ssj0000655099 035 $a(PQKBManifestationID)12256588 035 $a(PQKBTitleCode)TC0000655099 035 $a(PQKBWorkID)10596201 035 $a(PQKB)10068686 035 $a(MiAaPQ)EBC836214 035 $a(Au-PeEL)EBL836214 035 $a(CaPaEBR)ebr10524237 035 $a(CaONFJC)MIL343307 035 $a(EXLCZ)992560000000079563 100 $a20120214d2011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCounter terrorism in diverse communities$b[electronic resource] /$fedited by S?dd?k Ekici 210 $aAmsterdam ;$aWashington, D.C. $cIOS Press$dc2011 215 $a1 online resource (328 p.) 225 1 $aNATO science for peace and security series. E, Human and societal dynamics,$x1874-6276 ;$vv. 90 300 $aDescription based upon print version of record. 311 $a1-60750-969-5 320 $aIncludes bibliographical references and indexes. 327 $aIntroduction : studies on counterterrorism and diversity -- pt. 1. The terrorism problem -- pt. 2. Terrorism prevention -- pt. 3. Community oriented counter terrorism -- pt. 4. Case studies on counterterrorism. 330 $aMany affluent societies around the world are proving an increasingly attractive destination for immigrants who are culturally and linguistically different. This can present challenges to state and local authorities attempting to identify those who pose a terrorist threat. There is a need to understand whether diversity in our communities poses a threat and, since diversity cannot be avoided, how it can be successfully incorporated into countering possible terror related threats. This book presents papers from the NATO Advanced Research Workshop (ARW) held in Antalya, Turkey, in May 2011. The p 410 0$aNATO science for peace and security series.$nE,$pHuman and societal dynamics ;$vv. 90. 606 $aTerrorism 606 $aTerrorism$xPrevention 615 0$aTerrorism. 615 0$aTerrorism$xPrevention. 676 $a363.3/2 676 $a363.325 701 $aEkici$b S?dd?k$01581467 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910791961403321 996 $aCounter terrorism in diverse communities$93862976 997 $aUNINA LEADER 01302nim 2200385Ka 450 001 9910159475303321 005 20250814103520.7 010 $a2-8211-0035-3 035 $a(CKB)3710000001019960 035 $a(ODN)ODN0003037441 035 $a(EXLCZ)993710000001019960 100 $a20180419d2012 uy 0 101 0 $afre 135 $auruna---||||| 181 $cspw$2rdacontent 182 $cs$2rdamedia 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBourvil /$f Bourvil 205 $aUnabridged. 210 $aCopenhagen K. $cSAGA Egmont$d2012 215 $a1 online resource (1 audio file) $cdigital 300 $aUnabridged. 330 $aSketches et chansons : A pied à cheval et en voiture, Je suis content ça marche, A bicyclette, La tactique du gendarme, Adèle, D'où viens-tu, Caroline Caroline, Causerie anti alcoolique, Papa joue du trombone, C'est une gamine charmante, A Joinville le Pont, Vive la mariée. 606 $aNonfiction$2OverDrive 606 $aHumor (Nonfiction)$2OverDrive 615 17$aNonfiction. 615 7$aHumor (Nonfiction). 686 $aHUM000000$2bisacsh 700 $aBourvil$01844266 701 $aBourvil$01844266 906 $aAUDIO 912 $a9910159475303321 996 $aBourvil$94426653 997 $aUNINA LEADER 02625aam 2200553I 450 001 9910711181103321 005 20251223202847.0 024 8 $aGOVPUB-C13-5f6013b315834e266c4814b53bfe57ad 035 $a(CKB)5470000002480197 035 $a(OCoLC)927737013 035 $a(EXLCZ)995470000002480197 100 $a20151105d2014 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aGuide to Attribute Based Access Control (ABAC) definition and considerations /$fV. C. Hu, D. Ferraiolo, D. R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, K. A. Scarfone 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d2014. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-162 300 $a2014. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 320 $aIncludes bibliographical references. 330 3 $aThis document provides Federal agencies with a definition of attribute based access control (ABAC). ABAC is a logical access control methodology where authorization to perform a set of operations is determined by evaluating attributes associated with the subject, object, requested operations, and, in some cases, environment conditions against policy, rules, or relationships that describe the allowable operations for a given set of attributes. This document also provides considerations for using ABAC to improve information sharing within organizations and between organizations while maintaining control of that information. 517 $aGuide to Attribute Based Access Control 610 $aAccess control 610 $aAccess control mechanism 610 $aAccess control model 610 $aAccess control policy 610 $aAttribute based access control (ABAC) 610 $aAuthorization 610 $aPrivilege 700 $aHu$b V. C$01410281 701 $aFerraiolo$b D$01410282 701 $aHu$b V. C$01410281 701 $aKuhn$b D. Richard$01162181 701 $aMiller$b R$0101765 701 $aSandlin$b K$01410284 701 $aScarfone$b K. A$01410285 701 $aSchnitzer$b Alexander$01410286 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711181103321 996 $aGuide to Attribute Based Access Control (ABAC) definition and considerations$94487591 997 $aUNINA