Books on the topic 'Database security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Database security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Samarati, Pierangela, and Ravi S. Sandhu, eds. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Full textMelissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Find full textSilvana, Castano, ed. Database security. New York, N.Y: ACM Press, 1995.
Find full textSpooner, David L., Steven A. Demurjian, and John E. Dobson, eds. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Full textLin, T. Y., and Shelly Qian, eds. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Full textJajodia, Sushil, ed. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Full textMustafa, Osama, and Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Full textGertz, Michael, and Sushil Jajodia, eds. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Full textF, Lunt Teresa, and Rome Air Development Center, eds. Research directionsin database security. New York: Springer-Verlag, 1992.
Find full textIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Find full textLunt, Teresa F., ed. Research Directions in Database Security. New York, NY: Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4612-2870-7.
Full textSamarati, Pierangela, Indrajit Ray, and Indrakshi Ray, eds. From Database to Cyber Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04834-1.
Full textOlivier, Martin S., and David L. Spooner, eds. Database and Application Security XV. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35587-0.
Full textF, Lunt Teresa, and Rome Air Development Center, eds. Research directions in database security. New York: Springer-Verlag, 1992.
Find full textLunt, Teresa F. Research Directions in Database Security. New York, NY: Springer New York, 1992.
Find full textOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Find full textChetty, Dean. Database security in a corporate environment. Oxford: Oxford Brookes University, 2000.
Find full textHellner, Helmut. Security on IBM z/VSE. Poughkeepsie, NY]: IBM, International Technical Support Organization, 2011.
Find full textHellner, Helmut. Security on IBM z/VSE. Poughkeepsie, NY: IBM, International Technical Support Organization, 2009.
Find full textDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Find full textGertz, Michael, and Sushil Jajodia. Handbook of database security: Applications and trends. London: Praxis, 2010.
Find full textAaron, Ingram, ed. Practical Oracle security: Your unauthorized guide to relationial database security. Rockland, MA: Syngress Pub., 2007.
Find full textIFIP TC 11 WG 11.3 Working Conference on Database Security (13th 1999 Seattle, Wash.). Research advances in database and information systems security: IFIP TC 11 WG 11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999, Seattle, Washington, USA. Boston: Kluwer Academic Publishers, 2000.
Find full textInstitute, IT Governance, ed. Oracle database security, audit and control features. Rolling Meadows, Illinois: IT Governance Institute, 2004.
Find full textPolk, William T. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full textPolk, William T. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full textISACA (Serving IT Governance Professionals). Security, audit and control features: Oracle database. 3rd ed. Rolling Meadows, IL: ISACA, 2009.
Find full textT, Polk William. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full textE, Bassham Lawrence, and National Institute of Standards and Technology (U.S.), eds. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Find full text1956-, Rivero Laura C., ed. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ed. Kaein chŏngbo DB rŭl wihan tʻonghaphyŏng poan kisul kaebal =: Development of integrated security technology for personal information database. [Seoul]: Chisik Kyŏngjebu, 2008.
Find full textYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ed. Kaein chŏngbo DB rŭl wihan tʻonghaphyŏng poan kisul kaebal =: Development of integrated security technology for personal information database. [Seoul]: Chisik Kyŏngjebu, 2008.
Find full textInternational Business Machines Corporation. International Technical Support Organization, ed. Security functions of IBM DB2 10 for z/OS. [Poughkeepsie, NY]: IBM Corp. International Technical Support Organization, 2011.
Find full textMontana. Legislature. Legislative Audit Division. Montana State University: Electronic research data security. [Helena, MT: Legislative Audit Division, 2006.
Find full textChałon, Maria. Ochrona i bezpieczeństwo danych oraz tendencje rozwojowe baz danych. Wrocław: Oficyna Wydawnicza Politechniki Wrocławskiej, 2007.
Find full textIFIP TC 11 Working Conference on Database Security (9th 1995 Rensselaerville, N.Y.). Database security IX: Status and prospects : proceedings of the Ninth Annual IFIP TC11 Working Conference on Database Security, August 1995. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1996.
Find full textWiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.
Find full textRobinson, Garry. Real World Microsoft Access Database Protection and Security. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0793-1.
Full textAtluri, Vijay, and John Hale, eds. Research Advances in Database and Information Systems Security. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35508-5.
Full textSatō, Yoshikuni. Dētabēsu hogo to kyōso seisaku: Sōsakusei o yōken to shinai dētabēsu hogo no kyōsō seisakuteki kōsatsu. Tōkyō: Chiteki Zaisan Kenkyūjo, 2006.
Find full textThe Database Hacker's Handbook: Defending Database Servers. Wiley, 2005.
Find full textThuraisingham, Bhavani. Database and Applications Security. Auerbach Publications, 2005. http://dx.doi.org/10.1201/9780203486061.
Full textOracle Database 12c Security. McGraw-Hill Education, 2015.
Find full textXiong, Jiping. Web and Database Security. INTECH Open Access Publisher, 2012.
Find full textDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Find full textBond, Rebecca, Kevin Yeung-Kuen See, Carmen Ka Man Wong, and Yuk-Kuen Henry Chan. Understanding DB2 9 Security. IBM Press, 2006.
Find full textBond, Rebecca, Kevin Yeung-Kuen See, Carmen Ka Man Wong, and Yuk-Kuen Henry Chan. Understanding DB2 9 Security. IBM Press, 2006.
Find full textDiaz, Christopher. Database Security: Problems and Solutions. Mercury Learning & Information, 2022.
Find full textImplementing Database Security and Auditing. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-334-7.x5000-2.
Full textOracle Database 12c Security Cookbook. Packt Publishing, Limited, 2016.
Find full text