Livros sobre o tema "Database security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Database security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Samarati, Pierangela, e Ravi S. Sandhu, eds. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Texto completo da fonteMelissa, Zgola, e Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Encontre o texto completo da fonteSilvana, Castano, ed. Database security. New York, N.Y: ACM Press, 1995.
Encontre o texto completo da fonteSpooner, David L., Steven A. Demurjian e John E. Dobson, eds. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Texto completo da fonteLin, T. Y., e Shelly Qian, eds. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Texto completo da fonteJajodia, Sushil, ed. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Texto completo da fonteMustafa, Osama, e Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Texto completo da fonteGertz, Michael, e Sushil Jajodia, eds. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Texto completo da fonteF, Lunt Teresa, e Rome Air Development Center, eds. Research directionsin database security. New York: Springer-Verlag, 1992.
Encontre o texto completo da fonteIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Encontre o texto completo da fonteLunt, Teresa F., ed. Research Directions in Database Security. New York, NY: Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4612-2870-7.
Texto completo da fonteSamarati, Pierangela, Indrajit Ray e Indrakshi Ray, eds. From Database to Cyber Security. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04834-1.
Texto completo da fonteOlivier, Martin S., e David L. Spooner, eds. Database and Application Security XV. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35587-0.
Texto completo da fonteF, Lunt Teresa, e Rome Air Development Center, eds. Research directions in database security. New York: Springer-Verlag, 1992.
Encontre o texto completo da fonteLunt, Teresa F. Research Directions in Database Security. New York, NY: Springer New York, 1992.
Encontre o texto completo da fonteOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Encontre o texto completo da fonteChetty, Dean. Database security in a corporate environment. Oxford: Oxford Brookes University, 2000.
Encontre o texto completo da fonteHellner, Helmut. Security on IBM z/VSE. Poughkeepsie, NY]: IBM, International Technical Support Organization, 2011.
Encontre o texto completo da fonteHellner, Helmut. Security on IBM z/VSE. Poughkeepsie, NY: IBM, International Technical Support Organization, 2009.
Encontre o texto completo da fonteDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Encontre o texto completo da fonteGertz, Michael, e Sushil Jajodia. Handbook of database security: Applications and trends. London: Praxis, 2010.
Encontre o texto completo da fonteAaron, Ingram, ed. Practical Oracle security: Your unauthorized guide to relationial database security. Rockland, MA: Syngress Pub., 2007.
Encontre o texto completo da fonteIFIP TC 11 WG 11.3 Working Conference on Database Security (13th 1999 Seattle, Wash.). Research advances in database and information systems security: IFIP TC 11 WG 11.3 Thirteenth Working Conference on Database Security, July 25-28, 1999, Seattle, Washington, USA. Boston: Kluwer Academic Publishers, 2000.
Encontre o texto completo da fonteInstitute, IT Governance, ed. Oracle database security, audit and control features. Rolling Meadows, Illinois: IT Governance Institute, 2004.
Encontre o texto completo da fontePolk, William T. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Encontre o texto completo da fontePolk, William T. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Encontre o texto completo da fonteISACA (Serving IT Governance Professionals). Security, audit and control features: Oracle database. 3a ed. Rolling Meadows, IL: ISACA, 2009.
Encontre o texto completo da fonteT, Polk William. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Encontre o texto completo da fonteE, Bassham Lawrence, e National Institute of Standards and Technology (U.S.), eds. Security issues in the database language SQL. Gaithersburg, MD: U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
Encontre o texto completo da fonte1956-, Rivero Laura C., ed. Database integrity: Challenges and solutions. Hershey, PA: Idea Group Pub., 2002.
Encontre o texto completo da fonteYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ed. Kaein chŏngbo DB rŭl wihan tʻonghaphyŏng poan kisul kaebal =: Development of integrated security technology for personal information database. [Seoul]: Chisik Kyŏngjebu, 2008.
Encontre o texto completo da fonteYŏnʼguwŏn, Hanʼguk Chŏnja Tʻongsin, ed. Kaein chŏngbo DB rŭl wihan tʻonghaphyŏng poan kisul kaebal =: Development of integrated security technology for personal information database. [Seoul]: Chisik Kyŏngjebu, 2008.
Encontre o texto completo da fonteInternational Business Machines Corporation. International Technical Support Organization, ed. Security functions of IBM DB2 10 for z/OS. [Poughkeepsie, NY]: IBM Corp. International Technical Support Organization, 2011.
Encontre o texto completo da fonteMontana. Legislature. Legislative Audit Division. Montana State University: Electronic research data security. [Helena, MT: Legislative Audit Division, 2006.
Encontre o texto completo da fonteChałon, Maria. Ochrona i bezpieczeństwo danych oraz tendencje rozwojowe baz danych. Wrocław: Oficyna Wydawnicza Politechniki Wrocławskiej, 2007.
Encontre o texto completo da fonteIFIP TC 11 Working Conference on Database Security (9th 1995 Rensselaerville, N.Y.). Database security IX: Status and prospects : proceedings of the Ninth Annual IFIP TC11 Working Conference on Database Security, August 1995. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1996.
Encontre o texto completo da fonteWiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.
Encontre o texto completo da fonteRobinson, Garry. Real World Microsoft Access Database Protection and Security. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0793-1.
Texto completo da fonteAtluri, Vijay, e John Hale, eds. Research Advances in Database and Information Systems Security. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35508-5.
Texto completo da fonteSatō, Yoshikuni. Dētabēsu hogo to kyōso seisaku: Sōsakusei o yōken to shinai dētabēsu hogo no kyōsō seisakuteki kōsatsu. Tōkyō: Chiteki Zaisan Kenkyūjo, 2006.
Encontre o texto completo da fonteThe Database Hacker's Handbook: Defending Database Servers. Wiley, 2005.
Encontre o texto completo da fonteThuraisingham, Bhavani. Database and Applications Security. Auerbach Publications, 2005. http://dx.doi.org/10.1201/9780203486061.
Texto completo da fonteOracle Database 12c Security. McGraw-Hill Education, 2015.
Encontre o texto completo da fonteXiong, Jiping. Web and Database Security. INTECH Open Access Publisher, 2012.
Encontre o texto completo da fonteDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Encontre o texto completo da fonteBond, Rebecca, Kevin Yeung-Kuen See, Carmen Ka Man Wong e Yuk-Kuen Henry Chan. Understanding DB2 9 Security. IBM Press, 2006.
Encontre o texto completo da fonteBond, Rebecca, Kevin Yeung-Kuen See, Carmen Ka Man Wong e Yuk-Kuen Henry Chan. Understanding DB2 9 Security. IBM Press, 2006.
Encontre o texto completo da fonteDiaz, Christopher. Database Security: Problems and Solutions. Mercury Learning & Information, 2022.
Encontre o texto completo da fonteImplementing Database Security and Auditing. Elsevier, 2005. http://dx.doi.org/10.1016/b978-1-55558-334-7.x5000-2.
Texto completo da fonteOracle Database 12c Security Cookbook. Packt Publishing, Limited, 2016.
Encontre o texto completo da fonte