Bücher zum Thema „Databases security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Bücher für die Forschung zum Thema "Databases security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Bücher für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Polischuk, Yuriy, und Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Der volle Inhalt der QuelleFaragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.
Den vollen Inhalt der Quelle findenIFIP TC11/WG11.3 Working Conference on Database and Application Security (15th 2001 Niagara-on-the-Lake, Ont.). Database and application security XV: IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. Boston: Kluwer Academic Publishers, 2002.
Den vollen Inhalt der Quelle findenIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Den vollen Inhalt der Quelle finden1956-, Atluri Vijay, und Samarati Pierangela, Hrsg. Security of data and transaction processing. Boston: Kluwer Academic, 2000.
Den vollen Inhalt der Quelle findenWiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.
Den vollen Inhalt der Quelle findenRodney, Clark, Holloway Simon und List William, Hrsg. The security, audit, and control of databases. Aldershot: Avebury Technical, 1991.
Den vollen Inhalt der Quelle findenOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Den vollen Inhalt der Quelle findenIFIP, TC11/WG11 3. Working Conference on Database Security (14th 2000 Schoorl Netherlands). Data and applications security: Developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. Boston: Kluwer Academic Publishers, 2001.
Den vollen Inhalt der Quelle findenDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Den vollen Inhalt der Quelle findenDavid, Knox, Hrsg. Applied Oracle security: Developing secure database and middleware environments. New York: Oracle Press/McGraw-Hill, 2010.
Den vollen Inhalt der Quelle findenUnited States. Department of Homeland Security. Office of Inspector General. Security weaknesses increase risks to critical DHS databases: (redacted). Washington, DC: Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2005.
Den vollen Inhalt der Quelle findenButare, Théopiste. Social security quantitative data: An inventory of existing databases. Geneva: International Social Security Association, 1994.
Den vollen Inhalt der Quelle findenGonder, Jeffrey. Establishing a secure data center with remote access: Preprint. Golden, Colo: National Renewable Energy Laboratory, 2012.
Den vollen Inhalt der Quelle findenAsonov, Dmitri. Querying databases privately: A new approach to private information retrieval. Berlin: Springer, 2004.
Den vollen Inhalt der Quelle findenUnited States. Congress. House. Committee on the Judiciary. Database and Collections of Information Misappropriation Act: Report together with dissenting views (to accompany H.R. 3261) (Including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.
Den vollen Inhalt der Quelle findenWeiss, Aaron. The complete idiot's guide to protecting yourself on the Internet. Indianapolis, IN: Que, 1995.
Den vollen Inhalt der Quelle findenUniversity of Chicago. Center for Research in Security Prices. Center for Research in Security Prices: CRSP. [Pennsylvania]: Wharton School, 1994.
Den vollen Inhalt der Quelle findenUSAF Institute for National Security Studies. INSS online occasional papers. [Colorado Springs], CO: Institute for National Security Studies, U.S. Air Force Academy, 1994.
Den vollen Inhalt der Quelle findenKohler, Matthew J. An effective access control mechanism and multilevel security for multilevel secure databases. Monterey, Calif: Naval Postgraduate School, 1989.
Den vollen Inhalt der Quelle findenNational Security Archive (U.S.). The National Security archive. Washington, D.C: George Washington University, 1995.
Den vollen Inhalt der Quelle findenInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Den vollen Inhalt der Quelle findenUnited States. National Aeronautics and Space Administration. Scientific and Technical Information Program., Hrsg. National security and national competitiveness: Open source solutions NASA requirements and capabilities. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1993.
Den vollen Inhalt der Quelle findenComputer Security Applications Conference (5th 1989 Tucson, Arizona). Fifth annual computer security applications conference: Tucson, Arizona December 4-8, 1989. Los Alamitos, Calif: IEEE Computer Press, 1990.
Den vollen Inhalt der Quelle findenDeka, Ganesh Chandra, und Sambit Bakshi. Handbook of research on securing cloud-based databases with biometric applications. Hershey, PA: Information, Science, Reference, 2015.
Den vollen Inhalt der Quelle findenEfimov, A. N. Pravovye aspekty i ot︠s︡enka programmnogo obespechenii︠a︡ ĖVM i baz dannykh. Moskva: Moskovskoe obshchestvo ot︠s︡enshchikov, 2002.
Den vollen Inhalt der Quelle findenPSD 2004 (2004 Barcelona, Spain). Privacy in statistical databases: CASC project final conference, PSD 2004, Barcelona, Catalonia, Spain, June 9-11, 2004 : proceedings. Berlin: Springer, 2004.
Den vollen Inhalt der Quelle findenJosep, Domingo-Ferrer, und Saygın Yücel, Hrsg. Privacy in statistical databases: UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings. Berlin: Springer, 2008.
Den vollen Inhalt der Quelle findenIFIP WG 11.3 Working Conference on Data and Applications Security (21st 2007 Redondo Beach, Calif.). Data and applications security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007 : proceedings. Berlin: Springer, 2007.
Den vollen Inhalt der Quelle findenPurwanto. Penelitian tentang perlindungan hukum data digital. [Jakarta]: Badan Pembinaan Hukum Nasional, Departemen Hukum dan Hak Asasi Manusia RI, 2007.
Den vollen Inhalt der Quelle findenservice), SpringerLink (Online, Hrsg. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Den vollen Inhalt der Quelle findenInternational Baltic Conference on Databases and Information Systems (9th 2010 Ri ga, Latvia). Databases and information systems VI: Selected papers from the Ninth International Baltic Conference, DB & IS 2010. Amsterdam: IOS Press, 2011.
Den vollen Inhalt der Quelle findenChryssanthou, Anargyros. Certification and security in health-related web applications: Concepts and solutions. Hershey PA: Medical Information Science Reference, 2011.
Den vollen Inhalt der Quelle findenInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Den vollen Inhalt der Quelle findenInstitute, Pennsylvania Bar. How to protect & safeguard customer information. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2001.
Den vollen Inhalt der Quelle findenUnited States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. [Washington, D.C.?: Internal Revenue Service, 1990.
Den vollen Inhalt der Quelle findenEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam und Hala S. El-Sayed. Multilevel Security for Relational Databases. Taylor & Francis Group, 2018.
Den vollen Inhalt der Quelle findenFaragallah, Osama S., El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam und Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17719.
Der volle Inhalt der QuelleEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam und Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Den vollen Inhalt der Quelle findenEl-Rabaie, El-Sayed M., Osama S. Faragallah und Fathi E. El-Samie. Multilevel Security for Relational Databases. Taylor & Francis Group, 2015.
Den vollen Inhalt der Quelle findenEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam und Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Den vollen Inhalt der Quelle findenDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Den vollen Inhalt der Quelle finden(Editor), Vijay Atluri, und Pierangela Samarati (Editor), Hrsg. Security of Data and Transaction. Springer, 2000.
Den vollen Inhalt der Quelle finden(Editor), Martin S. Olivier, und David L. Spooner (Editor), Hrsg. Database and Application Security XV (IFIP International Federation for Information Processing). Springer, 2002.
Den vollen Inhalt der Quelle finden(Editor), Pierangela Samarati, und Ravi Sandhu (Editor), Hrsg. Database Security X: Status and prospects (IFIP International Federation for Information Processing). Springer, 1997.
Den vollen Inhalt der Quelle findenDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science). Springer, 2002.
Den vollen Inhalt der Quelle findenWorkshop on Security for Object-Oriented Systems, R. Sandhu und B. Thuraisingham. Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington Dc, Usa, (Workshops in Computing). Springer-Verlag Telos, 1994.
Den vollen Inhalt der Quelle findenConsortium, SEISMED. Data Security for Health Care: User Guidelines (Studies in Health Technology and Informatics, Vol 33). Ios Pr Inc, 1996.
Den vollen Inhalt der Quelle findenConsortium, SEISMED. Data Security for Health Care: Technical Guidelines (Studies in Health Technology and Informatics, Vol 32). Ios Pr Inc, 1996.
Den vollen Inhalt der Quelle findenConsortium, SEISMED. Data Security for Health Care: Management Guidelines (Studies in Health Technology and Informatics, Vol 31). Ios Pr Inc, 1996.
Den vollen Inhalt der Quelle finden