Libri sul tema "Databases security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Databases security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Polischuk, Yuriy, e Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Testo completoFaragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.
Cerca il testo completoIFIP TC11/WG11.3 Working Conference on Database and Application Security (15th 2001 Niagara-on-the-Lake, Ont.). Database and application security XV: IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. Boston: Kluwer Academic Publishers, 2002.
Cerca il testo completoIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Cerca il testo completo1956-, Atluri Vijay, e Samarati Pierangela, a cura di. Security of data and transaction processing. Boston: Kluwer Academic, 2000.
Cerca il testo completoWiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.
Cerca il testo completoRodney, Clark, Holloway Simon e List William, a cura di. The security, audit, and control of databases. Aldershot: Avebury Technical, 1991.
Cerca il testo completoOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Cerca il testo completoIFIP, TC11/WG11 3. Working Conference on Database Security (14th 2000 Schoorl Netherlands). Data and applications security: Developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. Boston: Kluwer Academic Publishers, 2001.
Cerca il testo completoDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Cerca il testo completoDavid, Knox, a cura di. Applied Oracle security: Developing secure database and middleware environments. New York: Oracle Press/McGraw-Hill, 2010.
Cerca il testo completoUnited States. Department of Homeland Security. Office of Inspector General. Security weaknesses increase risks to critical DHS databases: (redacted). Washington, DC: Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2005.
Cerca il testo completoButare, Théopiste. Social security quantitative data: An inventory of existing databases. Geneva: International Social Security Association, 1994.
Cerca il testo completoGonder, Jeffrey. Establishing a secure data center with remote access: Preprint. Golden, Colo: National Renewable Energy Laboratory, 2012.
Cerca il testo completoAsonov, Dmitri. Querying databases privately: A new approach to private information retrieval. Berlin: Springer, 2004.
Cerca il testo completoUnited States. Congress. House. Committee on the Judiciary. Database and Collections of Information Misappropriation Act: Report together with dissenting views (to accompany H.R. 3261) (Including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.
Cerca il testo completoWeiss, Aaron. The complete idiot's guide to protecting yourself on the Internet. Indianapolis, IN: Que, 1995.
Cerca il testo completoUniversity of Chicago. Center for Research in Security Prices. Center for Research in Security Prices: CRSP. [Pennsylvania]: Wharton School, 1994.
Cerca il testo completoUSAF Institute for National Security Studies. INSS online occasional papers. [Colorado Springs], CO: Institute for National Security Studies, U.S. Air Force Academy, 1994.
Cerca il testo completoKohler, Matthew J. An effective access control mechanism and multilevel security for multilevel secure databases. Monterey, Calif: Naval Postgraduate School, 1989.
Cerca il testo completoNational Security Archive (U.S.). The National Security archive. Washington, D.C: George Washington University, 1995.
Cerca il testo completoInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Cerca il testo completoUnited States. National Aeronautics and Space Administration. Scientific and Technical Information Program., a cura di. National security and national competitiveness: Open source solutions NASA requirements and capabilities. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1993.
Cerca il testo completoComputer Security Applications Conference (5th 1989 Tucson, Arizona). Fifth annual computer security applications conference: Tucson, Arizona December 4-8, 1989. Los Alamitos, Calif: IEEE Computer Press, 1990.
Cerca il testo completoDeka, Ganesh Chandra, e Sambit Bakshi. Handbook of research on securing cloud-based databases with biometric applications. Hershey, PA: Information, Science, Reference, 2015.
Cerca il testo completoEfimov, A. N. Pravovye aspekty i ot︠s︡enka programmnogo obespechenii︠a︡ ĖVM i baz dannykh. Moskva: Moskovskoe obshchestvo ot︠s︡enshchikov, 2002.
Cerca il testo completoPSD 2004 (2004 Barcelona, Spain). Privacy in statistical databases: CASC project final conference, PSD 2004, Barcelona, Catalonia, Spain, June 9-11, 2004 : proceedings. Berlin: Springer, 2004.
Cerca il testo completoJosep, Domingo-Ferrer, e Saygın Yücel, a cura di. Privacy in statistical databases: UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings. Berlin: Springer, 2008.
Cerca il testo completoIFIP WG 11.3 Working Conference on Data and Applications Security (21st 2007 Redondo Beach, Calif.). Data and applications security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007 : proceedings. Berlin: Springer, 2007.
Cerca il testo completoPurwanto. Penelitian tentang perlindungan hukum data digital. [Jakarta]: Badan Pembinaan Hukum Nasional, Departemen Hukum dan Hak Asasi Manusia RI, 2007.
Cerca il testo completoservice), SpringerLink (Online, a cura di. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Cerca il testo completoInternational Baltic Conference on Databases and Information Systems (9th 2010 Ri ga, Latvia). Databases and information systems VI: Selected papers from the Ninth International Baltic Conference, DB & IS 2010. Amsterdam: IOS Press, 2011.
Cerca il testo completoChryssanthou, Anargyros. Certification and security in health-related web applications: Concepts and solutions. Hershey PA: Medical Information Science Reference, 2011.
Cerca il testo completoInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Cerca il testo completoInstitute, Pennsylvania Bar. How to protect & safeguard customer information. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2001.
Cerca il testo completoUnited States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. [Washington, D.C.?: Internal Revenue Service, 1990.
Cerca il testo completoEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam e Hala S. El-Sayed. Multilevel Security for Relational Databases. Taylor & Francis Group, 2018.
Cerca il testo completoFaragallah, Osama S., El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam e Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17719.
Testo completoEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam e Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Cerca il testo completoEl-Rabaie, El-Sayed M., Osama S. Faragallah e Fathi E. El-Samie. Multilevel Security for Relational Databases. Taylor & Francis Group, 2015.
Cerca il testo completoEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam e Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Cerca il testo completoDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Cerca il testo completo(Editor), Vijay Atluri, e Pierangela Samarati (Editor), a cura di. Security of Data and Transaction. Springer, 2000.
Cerca il testo completo(Editor), Martin S. Olivier, e David L. Spooner (Editor), a cura di. Database and Application Security XV (IFIP International Federation for Information Processing). Springer, 2002.
Cerca il testo completo(Editor), Pierangela Samarati, e Ravi Sandhu (Editor), a cura di. Database Security X: Status and prospects (IFIP International Federation for Information Processing). Springer, 1997.
Cerca il testo completoDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science). Springer, 2002.
Cerca il testo completoWorkshop on Security for Object-Oriented Systems, R. Sandhu e B. Thuraisingham. Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington Dc, Usa, (Workshops in Computing). Springer-Verlag Telos, 1994.
Cerca il testo completoConsortium, SEISMED. Data Security for Health Care: User Guidelines (Studies in Health Technology and Informatics, Vol 33). Ios Pr Inc, 1996.
Cerca il testo completoConsortium, SEISMED. Data Security for Health Care: Technical Guidelines (Studies in Health Technology and Informatics, Vol 32). Ios Pr Inc, 1996.
Cerca il testo completoConsortium, SEISMED. Data Security for Health Care: Management Guidelines (Studies in Health Technology and Informatics, Vol 31). Ios Pr Inc, 1996.
Cerca il testo completo