Libros sobre el tema "Databases security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Databases security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Polischuk, Yuriy y Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Texto completoFaragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.
Buscar texto completoIFIP TC11/WG11.3 Working Conference on Database and Application Security (15th 2001 Niagara-on-the-Lake, Ont.). Database and application security XV: IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. Boston: Kluwer Academic Publishers, 2002.
Buscar texto completoIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Buscar texto completo1956-, Atluri Vijay y Samarati Pierangela, eds. Security of data and transaction processing. Boston: Kluwer Academic, 2000.
Buscar texto completoWiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.
Buscar texto completoRodney, Clark, Holloway Simon y List William, eds. The security, audit, and control of databases. Aldershot: Avebury Technical, 1991.
Buscar texto completoOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Buscar texto completoIFIP, TC11/WG11 3. Working Conference on Database Security (14th 2000 Schoorl Netherlands). Data and applications security: Developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. Boston: Kluwer Academic Publishers, 2001.
Buscar texto completoDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Buscar texto completoDavid, Knox, ed. Applied Oracle security: Developing secure database and middleware environments. New York: Oracle Press/McGraw-Hill, 2010.
Buscar texto completoUnited States. Department of Homeland Security. Office of Inspector General. Security weaknesses increase risks to critical DHS databases: (redacted). Washington, DC: Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2005.
Buscar texto completoButare, Théopiste. Social security quantitative data: An inventory of existing databases. Geneva: International Social Security Association, 1994.
Buscar texto completoGonder, Jeffrey. Establishing a secure data center with remote access: Preprint. Golden, Colo: National Renewable Energy Laboratory, 2012.
Buscar texto completoAsonov, Dmitri. Querying databases privately: A new approach to private information retrieval. Berlin: Springer, 2004.
Buscar texto completoUnited States. Congress. House. Committee on the Judiciary. Database and Collections of Information Misappropriation Act: Report together with dissenting views (to accompany H.R. 3261) (Including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.
Buscar texto completoWeiss, Aaron. The complete idiot's guide to protecting yourself on the Internet. Indianapolis, IN: Que, 1995.
Buscar texto completoUniversity of Chicago. Center for Research in Security Prices. Center for Research in Security Prices: CRSP. [Pennsylvania]: Wharton School, 1994.
Buscar texto completoUSAF Institute for National Security Studies. INSS online occasional papers. [Colorado Springs], CO: Institute for National Security Studies, U.S. Air Force Academy, 1994.
Buscar texto completoKohler, Matthew J. An effective access control mechanism and multilevel security for multilevel secure databases. Monterey, Calif: Naval Postgraduate School, 1989.
Buscar texto completoNational Security Archive (U.S.). The National Security archive. Washington, D.C: George Washington University, 1995.
Buscar texto completoInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Buscar texto completoUnited States. National Aeronautics and Space Administration. Scientific and Technical Information Program., ed. National security and national competitiveness: Open source solutions NASA requirements and capabilities. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1993.
Buscar texto completoComputer Security Applications Conference (5th 1989 Tucson, Arizona). Fifth annual computer security applications conference: Tucson, Arizona December 4-8, 1989. Los Alamitos, Calif: IEEE Computer Press, 1990.
Buscar texto completoDeka, Ganesh Chandra y Sambit Bakshi. Handbook of research on securing cloud-based databases with biometric applications. Hershey, PA: Information, Science, Reference, 2015.
Buscar texto completoEfimov, A. N. Pravovye aspekty i ot︠s︡enka programmnogo obespechenii︠a︡ ĖVM i baz dannykh. Moskva: Moskovskoe obshchestvo ot︠s︡enshchikov, 2002.
Buscar texto completoPSD 2004 (2004 Barcelona, Spain). Privacy in statistical databases: CASC project final conference, PSD 2004, Barcelona, Catalonia, Spain, June 9-11, 2004 : proceedings. Berlin: Springer, 2004.
Buscar texto completoJosep, Domingo-Ferrer y Saygın Yücel, eds. Privacy in statistical databases: UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings. Berlin: Springer, 2008.
Buscar texto completoIFIP WG 11.3 Working Conference on Data and Applications Security (21st 2007 Redondo Beach, Calif.). Data and applications security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007 : proceedings. Berlin: Springer, 2007.
Buscar texto completoPurwanto. Penelitian tentang perlindungan hukum data digital. [Jakarta]: Badan Pembinaan Hukum Nasional, Departemen Hukum dan Hak Asasi Manusia RI, 2007.
Buscar texto completoservice), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Buscar texto completoInternational Baltic Conference on Databases and Information Systems (9th 2010 Ri ga, Latvia). Databases and information systems VI: Selected papers from the Ninth International Baltic Conference, DB & IS 2010. Amsterdam: IOS Press, 2011.
Buscar texto completoChryssanthou, Anargyros. Certification and security in health-related web applications: Concepts and solutions. Hershey PA: Medical Information Science Reference, 2011.
Buscar texto completoInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Buscar texto completoInstitute, Pennsylvania Bar. How to protect & safeguard customer information. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2001.
Buscar texto completoUnited States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. [Washington, D.C.?: Internal Revenue Service, 1990.
Buscar texto completoEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam y Hala S. El-Sayed. Multilevel Security for Relational Databases. Taylor & Francis Group, 2018.
Buscar texto completoFaragallah, Osama S., El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam y Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17719.
Texto completoEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam y Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Buscar texto completoEl-Rabaie, El-Sayed M., Osama S. Faragallah y Fathi E. El-Samie. Multilevel Security for Relational Databases. Taylor & Francis Group, 2015.
Buscar texto completoEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam y Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Buscar texto completoDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Buscar texto completo(Editor), Vijay Atluri y Pierangela Samarati (Editor), eds. Security of Data and Transaction. Springer, 2000.
Buscar texto completo(Editor), Martin S. Olivier y David L. Spooner (Editor), eds. Database and Application Security XV (IFIP International Federation for Information Processing). Springer, 2002.
Buscar texto completo(Editor), Pierangela Samarati y Ravi Sandhu (Editor), eds. Database Security X: Status and prospects (IFIP International Federation for Information Processing). Springer, 1997.
Buscar texto completoDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science). Springer, 2002.
Buscar texto completoWorkshop on Security for Object-Oriented Systems, R. Sandhu y B. Thuraisingham. Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington Dc, Usa, (Workshops in Computing). Springer-Verlag Telos, 1994.
Buscar texto completoConsortium, SEISMED. Data Security for Health Care: User Guidelines (Studies in Health Technology and Informatics, Vol 33). Ios Pr Inc, 1996.
Buscar texto completoConsortium, SEISMED. Data Security for Health Care: Technical Guidelines (Studies in Health Technology and Informatics, Vol 32). Ios Pr Inc, 1996.
Buscar texto completoConsortium, SEISMED. Data Security for Health Care: Management Guidelines (Studies in Health Technology and Informatics, Vol 31). Ios Pr Inc, 1996.
Buscar texto completo