Search again

Found: 4  Titles

Order by :    Show:   Per Page
image
Database and applications security : integrating information security and data management / Bhavani Thuraisingham
Author
Thuraisingham, Bhavani.
Published
Boca Raton : Auerbach, c2005.
Call Number
QA76.9.D314 T45
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain / Rajneesh Gupta.
Author
Gupta, Rajneesh.
Published
Birmingham, United Kingdom : Packt Publishing, c2018.
Call Number
Ebook

image
Implementing database security and auditing : a guide for DBAs, information security administrators and auditors / Ron Ben Natan.
Author
Ben-Natan, Ron.
Published
Amsterdam : Elsevier, c2005.
Call Number
QA76.9.A25 B404i
Location
ห้องสมุดสำนักการเรียนรู้ตลอดชีวิตฯ

image
Introduction to secure outsourcing computation / Xiaofeng Chen.
Author
Chen, Xiaofeng,
Call Number
QA76.585 .C445 2016,004.6782 23

Search Tools: Get RSS Feed
Style Switcher
Theme Colors

Layout Styles