Search again

Found: 16  Titles

Order by :    Show:   Per Page
image
Applied oracle security : developing secure database and middleware environments / David C. Knox ... [et al.]
Published
New York : McGraw Hill, c2010.
Call Number
QA76.9.D314 A62
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Database and applications security : integrating information security and data management / Bhavani Thuraisingham
Author
Thuraisingham, Bhavani.
Published
Boca Raton : Auerbach, c2005.
Call Number
QA76.9.D314 T45
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image

image
Database security / Silvana Castano ... [et al.]
Published
Wokingham : Addison-Wesley, c1995.
Call Number
QA76.9.D314 D33
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Effective oracle database 10g security by design / David Knox.
Author
Knox, David.
Published
New York : McGraw-Hill/Osborne, c2004.
Call Number
QA76.9.D314 K615e
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Efficient usage of adabas replication a practical solution finder / Dieter W. Storr ; edited by Stephen Fedtke
Author
Storr, Dieter W
Published
Wiesbaden : Vieweg+Teubner Verlag, c2011.
Call Number
Ebook

image
Expert Oracle and Java security programming secure Oracle database applications with Java / by David Coffin
Author
Coffin, David
Published
Berkeley, CA : Apress, c2011.
Call Number
Ebook

image
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain / Rajneesh Gupta.
Author
Gupta, Rajneesh.
Published
Birmingham, United Kingdom : Packt Publishing, c2018.
Call Number
Ebook

image
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors / Ron Ben Natan.
Author
Ben-Natan, Ron.
Published
Amsterdam : Elsevier, c2005.
Call Number
QA76.9.A25 B404i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Information security policies made easy : a comprehensive set of information security policies : version 10 / by Charles Cresson Wood.
Author
Wood, Charles Cresson.
Published
Houston, Texas : Information Shield, c2005.
Call Number
QA76.9.A25 W634i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Introduction to secure outsourcing computation / Xiaofeng Chen.
Author
Chen, Xiaofeng,
Call Number
QA76.585 .C445 2016,004.6782 23

image
Privacy-preserving data publishing an overview / Raymond Chi-Wing Wong and Ada Wai-Chee Fu.
Author
Wong, Raymond Chi-Wing.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool Publishers, c2010.
Call Number
HF5548.37 .W656 2010,658.478 22

image
Private information retrieval / Xun Yi, Russell Paulet, Elisa Bertino.
Author
Yi, Xun.,
Call Number
025.524 23,MoCl 6813412 IEEE,ZA3075 .Y56 2013

image
Protecting Oracle database 12c Paul Wright.
Author
Wright, Paul M.
Published
Berlin : Springer, c2014.
Call Number
Ebook

image
Query answer authentication HweeHwa Pang and Kian-Lee Tan.
Author
Pang, HweeHwa.
Published
San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : Morgan & Claypool, c2012.
Call Number
QA76.9.D314 P256 2012,005.8 23

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles