Livros sobre o tema "Databases security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Databases security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Polischuk, Yuriy, e Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Texto completo da fonteFaragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.
Encontre o texto completo da fonteIFIP TC11/WG11.3 Working Conference on Database and Application Security (15th 2001 Niagara-on-the-Lake, Ont.). Database and application security XV: IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. Boston: Kluwer Academic Publishers, 2002.
Encontre o texto completo da fonteIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Encontre o texto completo da fonte1956-, Atluri Vijay, e Samarati Pierangela, eds. Security of data and transaction processing. Boston: Kluwer Academic, 2000.
Encontre o texto completo da fonteWiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.
Encontre o texto completo da fonteRodney, Clark, Holloway Simon e List William, eds. The security, audit, and control of databases. Aldershot: Avebury Technical, 1991.
Encontre o texto completo da fonteOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Encontre o texto completo da fonteIFIP, TC11/WG11 3. Working Conference on Database Security (14th 2000 Schoorl Netherlands). Data and applications security: Developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. Boston: Kluwer Academic Publishers, 2001.
Encontre o texto completo da fonteDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Encontre o texto completo da fonteDavid, Knox, ed. Applied Oracle security: Developing secure database and middleware environments. New York: Oracle Press/McGraw-Hill, 2010.
Encontre o texto completo da fonteUnited States. Department of Homeland Security. Office of Inspector General. Security weaknesses increase risks to critical DHS databases: (redacted). Washington, DC: Dept. of Homeland Security, Office of Inspector General, Office of Information Technology, 2005.
Encontre o texto completo da fonteButare, Théopiste. Social security quantitative data: An inventory of existing databases. Geneva: International Social Security Association, 1994.
Encontre o texto completo da fonteGonder, Jeffrey. Establishing a secure data center with remote access: Preprint. Golden, Colo: National Renewable Energy Laboratory, 2012.
Encontre o texto completo da fonteAsonov, Dmitri. Querying databases privately: A new approach to private information retrieval. Berlin: Springer, 2004.
Encontre o texto completo da fonteUnited States. Congress. House. Committee on the Judiciary. Database and Collections of Information Misappropriation Act: Report together with dissenting views (to accompany H.R. 3261) (Including cost estimate of the Congressional Budget Office). [Washington, D.C: U.S. G.P.O., 2004.
Encontre o texto completo da fonteWeiss, Aaron. The complete idiot's guide to protecting yourself on the Internet. Indianapolis, IN: Que, 1995.
Encontre o texto completo da fonteUniversity of Chicago. Center for Research in Security Prices. Center for Research in Security Prices: CRSP. [Pennsylvania]: Wharton School, 1994.
Encontre o texto completo da fonteUSAF Institute for National Security Studies. INSS online occasional papers. [Colorado Springs], CO: Institute for National Security Studies, U.S. Air Force Academy, 1994.
Encontre o texto completo da fonteKohler, Matthew J. An effective access control mechanism and multilevel security for multilevel secure databases. Monterey, Calif: Naval Postgraduate School, 1989.
Encontre o texto completo da fonteNational Security Archive (U.S.). The National Security archive. Washington, D.C: George Washington University, 1995.
Encontre o texto completo da fonteInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Encontre o texto completo da fonteUnited States. National Aeronautics and Space Administration. Scientific and Technical Information Program., ed. National security and national competitiveness: Open source solutions NASA requirements and capabilities. [Washington, DC]: National Aeronautics and Space Administration, Office of Management, Scientific and Technical Information Program, 1993.
Encontre o texto completo da fonteComputer Security Applications Conference (5th 1989 Tucson, Arizona). Fifth annual computer security applications conference: Tucson, Arizona December 4-8, 1989. Los Alamitos, Calif: IEEE Computer Press, 1990.
Encontre o texto completo da fonteDeka, Ganesh Chandra, e Sambit Bakshi. Handbook of research on securing cloud-based databases with biometric applications. Hershey, PA: Information, Science, Reference, 2015.
Encontre o texto completo da fonteEfimov, A. N. Pravovye aspekty i ot︠s︡enka programmnogo obespechenii︠a︡ ĖVM i baz dannykh. Moskva: Moskovskoe obshchestvo ot︠s︡enshchikov, 2002.
Encontre o texto completo da fontePSD 2004 (2004 Barcelona, Spain). Privacy in statistical databases: CASC project final conference, PSD 2004, Barcelona, Catalonia, Spain, June 9-11, 2004 : proceedings. Berlin: Springer, 2004.
Encontre o texto completo da fonteJosep, Domingo-Ferrer, e Saygın Yücel, eds. Privacy in statistical databases: UNESCO Chair in Data Privacy, international conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008 : proceedings. Berlin: Springer, 2008.
Encontre o texto completo da fonteIFIP WG 11.3 Working Conference on Data and Applications Security (21st 2007 Redondo Beach, Calif.). Data and applications security XXI: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007 : proceedings. Berlin: Springer, 2007.
Encontre o texto completo da fontePurwanto. Penelitian tentang perlindungan hukum data digital. [Jakarta]: Badan Pembinaan Hukum Nasional, Departemen Hukum dan Hak Asasi Manusia RI, 2007.
Encontre o texto completo da fonteservice), SpringerLink (Online, ed. Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Encontre o texto completo da fonteInternational Baltic Conference on Databases and Information Systems (9th 2010 Ri ga, Latvia). Databases and information systems VI: Selected papers from the Ninth International Baltic Conference, DB & IS 2010. Amsterdam: IOS Press, 2011.
Encontre o texto completo da fonteChryssanthou, Anargyros. Certification and security in health-related web applications: Concepts and solutions. Hershey PA: Medical Information Science Reference, 2011.
Encontre o texto completo da fonteInternational Conference on Cooperative Information Systems (2008 Monterrey, Mexico). On the move to meaningful internet systems 2008: OTM 2008 confederated international conferences, COOPIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings, part I. Berlin: Springer, 2008.
Encontre o texto completo da fonteInstitute, Pennsylvania Bar. How to protect & safeguard customer information. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2001.
Encontre o texto completo da fonteUnited States. Internal Revenue Service. You are the key!: Automated Information Systems Security : instructor guide. [Washington, D.C.?: Internal Revenue Service, 1990.
Encontre o texto completo da fonteEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam e Hala S. El-Sayed. Multilevel Security for Relational Databases. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteFaragallah, Osama S., El-Sayed M. El-Rabaie, Fathi E. Abd El-Samie, Ahmed I. Sallam e Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publications, 2014. http://dx.doi.org/10.1201/b17719.
Texto completo da fonteEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam e Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Encontre o texto completo da fonteEl-Rabaie, El-Sayed M., Osama S. Faragallah e Fathi E. El-Samie. Multilevel Security for Relational Databases. Taylor & Francis Group, 2015.
Encontre o texto completo da fonteEl-Samie, Fathi E. Abd, El-Sayed M. El-Rabaie, Osama S. Faragallah, Ahmed I. Sallam e Hala S. El-Sayed. Multilevel Security for Relational Databases. Auerbach Publishers, Incorporated, 2014.
Encontre o texto completo da fonteDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice. Springer London, Limited, 2003.
Encontre o texto completo da fonte(Editor), Vijay Atluri, e Pierangela Samarati (Editor), eds. Security of Data and Transaction. Springer, 2000.
Encontre o texto completo da fonte(Editor), Martin S. Olivier, e David L. Spooner (Editor), eds. Database and Application Security XV (IFIP International Federation for Information Processing). Springer, 2002.
Encontre o texto completo da fonte(Editor), Pierangela Samarati, e Ravi Sandhu (Editor), eds. Database Security X: Status and prospects (IFIP International Federation for Information Processing). Springer, 1997.
Encontre o texto completo da fonteDomingo-Ferrer, Josep. Inference Control in Statistical Databases: From Theory to Practice (Lecture Notes in Computer Science). Springer, 2002.
Encontre o texto completo da fonteWorkshop on Security for Object-Oriented Systems, R. Sandhu e B. Thuraisingham. Security for Object-Oriented Systems: Proceedings of the Oopsla-93 Conference Workshop on Security for Object-Oriented Systems, Washington Dc, Usa, (Workshops in Computing). Springer-Verlag Telos, 1994.
Encontre o texto completo da fonteConsortium, SEISMED. Data Security for Health Care: User Guidelines (Studies in Health Technology and Informatics, Vol 33). Ios Pr Inc, 1996.
Encontre o texto completo da fonteConsortium, SEISMED. Data Security for Health Care: Technical Guidelines (Studies in Health Technology and Informatics, Vol 32). Ios Pr Inc, 1996.
Encontre o texto completo da fonteConsortium, SEISMED. Data Security for Health Care: Management Guidelines (Studies in Health Technology and Informatics, Vol 31). Ios Pr Inc, 1996.
Encontre o texto completo da fonte