Books on the topic 'Databases security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Databases security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Polischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Full textFaragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.
Find full textIFIP TC11/WG11.3 Working Conference on Database and Application Security (15th 2001 Niagara-on-the-Lake, Ont.). Database and application security XV: IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. Boston: Kluwer Academic Publishers, 2002.
Find full textIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Find full text1956-, Atluri Vijay, and Samarati Pierangela, eds. Security of data and transaction processing. Boston: Kluwer Academic, 2000.
Find full textWiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.
Find full textRodney, Clark, Holloway Simon, and List William, eds. The security, audit, and control of databases. Aldershot: Avebury Technical, 1991.
Find full textOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Find full textIFIP, TC11/WG11 3. Working Conference on Database Security (14th 2000 Schoorl Netherlands). Data and applications security: Developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. Boston: Kluwer Academic Publishers, 2001.
Find full textDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Find full textDavid, Knox, ed. Applied Oracle security: Developing secure database and middleware environments. New York: Oracle Press/McGraw-Hill, 2010.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Security weaknesses increase risks to critical DHS databases: (redacted). Washington, DC: Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2005.
Find full textButare, Théopiste. Social security quantitative data: An inventory of existing databases. Geneva: International Social Security Association, 1994.
Find full textGonder, Jeffrey. Establishing a secure data center with remote access: Preprint. Golden, Colo: National Renewable Energy Laboratory, 2012.
Find full textAsonov, Dmitri. Querying databases privately: A new approach to private information retrieval. Berlin: Springer, 2004.
Find full textUnited States. Congress. House. Committee on the Judiciary. Database and Collections of Information Misappropriation Act: Report together with dissenting views (to accompany H.R. 3261) (Including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.
Find full textWeiss, Aaron. The complete idiot's guide to protecting yourself on the Internet. Indianapolis, IN: Que, 1995.
Find full textUniversity of Chicago. Center for Research in Security Prices. Center for Research in Security Prices: CRSP. [Pennsylvania]: Wharton School, 1994.
Find full textUSAF Institute for National Security Studies. INSS online occasional papers. [Colorado Springs], CO: Institute for National Security Studies, U.S. Air Force Academy, 1994.
Find full textKohler, Matthew J. An effective access control mechanism and multilevel security for multilevel secure databases. Monterey, Calif: Naval Postgraduate School, 1989.
Find full textNational Security Archive (U.S.). The National Security archive. Washington, D.C: George Washington University, 1995.
Find full textInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Find full textUnited States. National Aeronautics and Space Administration. Scientific and Technical Information Program., ed. National security and national competitiveness: Open source solutions NASA requirements and capabilities. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1993.
Find full textComputer Security Applications Conference (5th 1989 Tucson, Arizona). Fifth annual computer security applications conference: Tucson, Arizona December 4-8, 1989. Los Alamitos, Calif: IEEE Computer Press, 1990.
Find full textDeka, Ganesh Chandra, and Sambit Bakshi. Handbook of research on securing cloud-based databases with biometric applications. Hershey, PA: Information, Science, Reference, 2015.
Find full textEfimov, A. N. Pravovye aspekty i ot︠s︡enka programmnogo obespechenii︠a︡ ĖVM i baz dannykh. Moskva: Moskovskoe obshchestvo ot︠s︡enshchikov, 2002.
Find full textPSD 2004 (2004 Barcelona, Spain). Privacy in statistical databases: CASC project final conference, PSD 2004, Barcelona, Catalonia, Spain, June 9-11, 2004 : proceedings. Berlin: Springer, 2004.
Find full textJosep, Domingo-Ferrer, and Saygın Yücel, eds. Privacy in statistical databases: UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings. Berlin: Springer, 2008.
Find full textIFIP WG 11.3 Working Conference on Data and Applications Security (21st 2007 Redondo Beach, Calif.). Data and applications security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007 : proceedings. Berlin: Springer, 2007.
Find full textPurwanto. Penelitian tentang perlindungan hukum data digital. [Jakarta]: Badan Pembinaan Hukum Nasional, Departemen Hukum dan Hak Asasi Manusia RI, 2007.
Find full textservice), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textInternational Baltic Conference on Databases and Information Systems (9th 2010 Ri ga, Latvia). Databases and information systems VI: Selected papers from the Ninth International Baltic Conference, DB & IS 2010. Amsterdam: IOS Press, 2011.
Find full textChryssanthou, Anargyros. Certification and security in health-related web applications: Concepts and solutions. Hershey PA: Medical Information Science Reference, 2011.
Find full textInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Find full textInstitute, Pennsylvania Bar. How to protect & safeguard customer information. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2001.
Find full textUnited States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. [Washington, D.C.?: Internal Revenue Service, 1990.
Find full textEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam, and Hala S. El-Sayed. Multilevel Security for Relational Databases. Taylor & Francis Group, 2018.
Find full textFaragallah, Osama S., El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam, and Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17719.
Full textEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam, and Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Find full textEl-Rabaie, El-Sayed M., Osama S. Faragallah, and Fathi E. El-Samie. Multilevel Security for Relational Databases. Taylor & Francis Group, 2015.
Find full textEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam, and Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Find full textDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Find full text(Editor), Vijay Atluri, and Pierangela Samarati (Editor), eds. Security of Data and Transaction. Springer, 2000.
Find full text(Editor), Martin S. Olivier, and David L. Spooner (Editor), eds. Database and Application Security XV (IFIP International Federation for Information Processing). Springer, 2002.
Find full text(Editor), Pierangela Samarati, and Ravi Sandhu (Editor), eds. Database Security X: Status and prospects (IFIP International Federation for Information Processing). Springer, 1997.
Find full textDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science). Springer, 2002.
Find full textWorkshop on Security for Object-Oriented Systems, R. Sandhu, and B. Thuraisingham. Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington Dc, Usa, (Workshops in Computing). Springer-Verlag Telos, 1994.
Find full textConsortium, SEISMED. Data Security for Health Care: User Guidelines (Studies in Health Technology and Informatics, Vol 33). Ios Pr Inc, 1996.
Find full textData Security for Health Care: Technical Guidelines (Studies in Health Technology and Informatics, Vol 32). Ios Pr Inc, 1996.
Find full textConsortium, SEISMED. Data Security for Health Care: Management Guidelines (Studies in Health Technology and Informatics, Vol 31). Ios Pr Inc, 1996.
Find full text