Libros sobre el tema "Database security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Database security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Samarati, Pierangela, and Ravi S. Sandhu, eds. Database Security. Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Texto completoMelissa, Zgola, and Bullaboy Dana, eds. Database security. Course Technology/Cengage Learning, 2012.
Buscar texto completoSpooner, David L., Steven A. Demurjian, and John E. Dobson, eds. Database Security IX. Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Texto completoLin, T. Y., and Shelly Qian, eds. Database Security XI. Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Texto completoJajodia, Sushil, ed. Database Security XII. Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Texto completoMustafa, Osama, and Robert P. Lockard. Oracle Database Application Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Texto completoGertz, Michael, and Sushil Jajodia, eds. Handbook of Database Security. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Texto completoF, Lunt Teresa, and Rome Air Development Center, eds. Research directionsin database security. Springer-Verlag, 1992.
Buscar texto completoIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Buscar texto completoLunt, Teresa F., ed. Research Directions in Database Security. Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4612-2870-7.
Texto completoSamarati, Pierangela, Indrajit Ray, and Indrakshi Ray, eds. From Database to Cyber Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04834-1.
Texto completoOlivier, Martin S., and David L. Spooner, eds. Database and Application Security XV. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35587-0.
Texto completoF, Lunt Teresa, and Rome Air Development Center, eds. Research directions in database security. Springer-Verlag, 1992.
Buscar texto completoLunt, Teresa F. Research Directions in Database Security. Springer New York, 1992.
Buscar texto completoOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. Springer-Verlag, 1994.
Buscar texto completoChetty, Dean. Database security in a corporate environment. Oxford Brookes University, 2000.
Buscar texto completoHellner, Helmut. Security on IBM z/VSE. IBM, International Technical Support Organization, 2011.
Buscar texto completoHellner, Helmut. Security on IBM z/VSE. IBM, International Technical Support Organization, 2009.
Buscar texto completoDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Springer, 2009.
Buscar texto completoGertz, Michael, and Sushil Jajodia. Handbook of database security: Applications and trends. Praxis, 2010.
Buscar texto completoAaron, Ingram, ed. Practical Oracle security: Your unauthorized guide to relationial database security. Syngress Pub., 2007.
Buscar texto completoIFIP TC 11 WG 11.3 Working Conference on Database Security (13th 1999 Seattle, Wash.). Research advances in database and information systems security: IFIP TC 11 WG 11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999, Seattle, Washington, USA. Kluwer Academic Publishers, 2000.
Buscar texto completoInstitute, IT Governance, ed. Oracle database security, audit and control features. IT Governance Institute, 2004.
Buscar texto completoPolk, William T. Security issues in the database language SQL. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Buscar texto completoPolk, William T. Security issues in the database language SQL. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Buscar texto completoISACA (Serving IT Governance Professionals). Security, audit and control features: Oracle database. 3rd ed. ISACA, 2009.
Buscar texto completoT, Polk William. Security issues in the database language SQL. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Buscar texto completoE, Bassham Lawrence, and National Institute of Standards and Technology (U.S.), eds. Security issues in the database language SQL. U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Buscar texto completo1956-, Rivero Laura C., ed. Database integrity: Challenges and solutions. Idea Group Pub., 2002.
Buscar texto completoYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Kaein chŏngbo DB rŭl wihan tʻonghaphyŏng poan kisul kaebal =: Development of integrated security technology for personal information database. Chisik Kyŏngjebu, 2008.
Buscar texto completoYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ред. Kaein chŏngbo DB rŭl wihan tʻonghaphyŏng poan kisul kaebal =: Development of integrated security technology for personal information database. Chisik Kyŏngjebu, 2008.
Buscar texto completoInternational Business Machines Corporation. International Technical Support Organization, ed. Security functions of IBM DB2 10 for z/OS. IBM Corp. International Technical Support Organization, 2011.
Buscar texto completoMontana. Legislature. Legislative Audit Division. Montana State University: Electronic research data security. Legislative Audit Division, 2006.
Buscar texto completoChałon, Maria. Ochrona i bezpieczeństwo danych oraz tendencje rozwojowe baz danych. Oficyna Wydawnicza Politechniki Wrocławskiej, 2007.
Buscar texto completoIFIP TC 11 Working Conference on Database Security (9th 1995 Rensselaerville, N.Y.). Database security IX: Status and prospects : proceedings of the Ninth Annual IFIP TC11 Working Conference on Database Security, August 1995. Chapman & Hall on behalf of the International Federation for Information Processing, 1996.
Buscar texto completoRobinson, Garry. Real World Microsoft Access Database Protection and Security. Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0793-1.
Texto completoAtluri, Vijay, and John Hale, eds. Research Advances in Database and Information Systems Security. Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35508-5.
Texto completoSatō, Yoshikuni. Dētabēsu hogo to kyōso seisaku: Sōsakusei o yōken to shinai dētabēsu hogo no kyōsō seisakuteki kōsatsu. Chiteki Zaisan Kenkyūjo, 2006.
Buscar texto completoThuraisingham, Bhavani. Database and Applications Security. Auerbach Publications, 2005. http://dx.doi.org/10.1201/9780203486061.
Texto completoXiong, Jiping. Web and Database Security. INTECH Open Access Publisher, 2012.
Buscar texto completoDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Buscar texto completoBond, Rebecca, Kevin Yeung-Kuen See, Carmen Ka Man Wong, and Yuk-Kuen Henry Chan. Understanding DB2 9 Security. IBM Press, 2006.
Buscar texto completoBond, Rebecca, Kevin Yeung-Kuen See, Carmen Ka Man Wong, and Yuk-Kuen Henry Chan. Understanding DB2 9 Security. IBM Press, 2006.
Buscar texto completoDiaz, Christopher. Database Security: Problems and Solutions. Mercury Learning & Information, 2022.
Buscar texto completoImplementing Database Security and Auditing. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-334-7.x5000-2.
Texto completo