Books on the topic 'Database security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Database security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Silvana, Castano, ed. Database security. New York, N.Y: ACM Press, 1995.
Samarati, Pierangela, and Ravi S. Sandhu, eds. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Basta, Alfred. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Spooner, David L., Steven A. Demurjian, and John E. Dobson, eds. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Lin, T. Y., and Shelly Qian, eds. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Jajodia, Sushil, ed. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Mustafa, Osama, and Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Gertz, Michael, and Sushil Jajodia, eds. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
F, Lunt Teresa, and Rome Air Development Center, eds. Research directionsin database security. New York: Springer-Verlag, 1992.
1950-, Bond Rebecca, ed. Understanding DB2 9 security. Upper Saddle River, NJ: IBM Press/Pearson, 2007.
IFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Lunt, Teresa F., ed. Research Directions in Database Security. New York, NY: Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4612-2870-7.
Samarati, Pierangela, Indrajit Ray, and Indrakshi Ray, eds. From Database to Cyber Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04834-1.
Olivier, Martin S., and David L. Spooner, eds. Database and Application Security XV. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35587-0.
F, Lunt Teresa, and Rome Air Development Center, eds. Research directions in database security. New York: Springer-Verlag, 1992.
Ben-Natan, Ron. Implementing database security and auditing. Boston: Digital Press, 2005.
Lunt, Teresa F. Research Directions in Database Security. New York, NY: Springer New York, 1992.
OOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
IFIP TC11/WG11.3 Working Conference on Database and Application Security (15th 2001 Niagara-on-the-Lake, Ont.). Database and application security XV: IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. Boston: Kluwer Academic Publishers, 2002.
Chetty, Dean. Database security in a corporate environment. Oxford: Oxford Brookes University, 2000.
1956-, Atluri Vijay, and Samarati Pierangela, eds. Security of data and transaction processing. Boston: Kluwer Academic, 2000.
Rodney, Clark, Holloway Simon, and List William, eds. The security, audit, and control of databases. Aldershot: Avebury Technical, 1991.
Hellner, Helmut. Security on IBM z/VSE. Poughkeepsie, NY]: IBM, International Technical Support Organization, 2011.
Hellner, Helmut. Security on IBM z/VSE. [United States?]: IBM, International Technical Support Organization, 2009.
Hellner, Helmut. Security on IBM z/VSE. Poughkeepsie, NY: IBM, International Technical Support Organization, 2009.
Gertz, Michael, and Sushil Jajodia. Handbook of database security: Applications and trends. London: Praxis, 2010.
Shaul, Josh. Practical Oracle security: Your unauthorized guide to relationial database security. Rockland, MA: Syngress Pub., 2007.
David, Knox, ed. Applied Oracle security: Developing secure database and middleware environments. New York: Oracle Press/McGraw-Hill, 2010.
DTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Polk, William T. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Polk, William T. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
E, Bassham Lawrence, and National Institute of Standards and Technology (U.S.), eds. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Institute, IT Governance, ed. Oracle database security, audit and control features. Rolling Meadows, Illinois: IT Governance Institute, 2004.
David, Knox. Effective Oracle Database 10g security by design. Emeryville, California: McGraw-Hill/Osborne : Oracle Press, 2004.
ISACA (Serving IT Governance Professionals). Security, audit and control features: Oracle database. 3rd ed. Rolling Meadows, IL: ISACA, 2009.
T, Polk William. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
IFIP TC 11 WG 11.3 Working Conference on Database Security (13th 1999 Seattle, Wash.). Research advances in database and information systems security: IFIP TC 11 WG 11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999, Seattle, Washington, USA. Boston: Kluwer Academic Publishers, 2000.
Doorn, Jorge H. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ed. Kaein chŏngbo DB rŭl wihan tʻonghaphyŏng poan kisul kaebal =: Development of integrated security technology for personal information database. [Seoul]: Chisik Kyŏngjebu, 2008.
Yŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ed. Kaein chŏngbo DB rŭl wihan tʻonghaphyŏng poan kisul kaebal =: Development of integrated security technology for personal information database. [Seoul]: Chisik Kyŏngjebu, 2008.
Whei-Jen, Chen, and International Business Machines Corporation. International Technical Support Organization., eds. DB2 security and compliance solutions for Linux, UNIX, and Windows. [Poughkeepsie, NY]: IBM, International Technical Support Organization, 2008.
Montana. Legislature. Legislative Audit Division. Montana State University: Electronic research data security. [Helena, MT: Legislative Audit Division, 2006.
IFIP, TC11/WG11 3. Working Conference on Database Security (14th 2000 Schoorl Netherlands). Data and applications security: Developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. Boston: Kluwer Academic Publishers, 2001.
Chałon, Maria. Ochrona i bezpieczeństwo danych oraz tendencje rozwojowe baz danych. Wrocław: Oficyna Wydawnicza Politechniki Wrocławskiej, 2007.
Litchfield, David, Chris Anley, John Heasman, and Bill Grindlay. The Database Hacker's Handbook: Defending Database Servers. Wiley, 2005.
Thuraisingham, Bhavani. Database and Applications Security. Auerbach Publications, 2005. http://dx.doi.org/10.1201/9780203486061.
David, Knox, Scott Gaetjen, and William Maroulis. Oracle Database 12c Security. McGraw-Hill Education, 2015.
Xiong, Jiping. Web and Database Security. INTECH Open Access Publisher, 2012.
Domingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Domingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science). Springer, 2002.