Techniques and Tools for Controlling Access, ACL and Firewalls | part of Computer Science Security: Concepts and Tools | Wiley Data and Cybersecurity books | IEEE Xplore