Search Results for Computers -- Access control - Narrowed by: Database security -- CongressesSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity$002b--$002bCongresses$002509Database$002bsecurity$002b--$002bCongresses$0026ps$003d300?dt=list2024-03-29T02:27:57ZDatabase security, III : status and prospectsent://SD_ILS/0/SD_ILS:1694792024-03-29T02:27:57Z2024-03-29T02:27:57Zby IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.)<br/>Author IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.), Spooner, David L., Landwehr, Carl E.<br/>Format: Books<br/>Call Number QA76.9.D314 I45 1989<br/>Publisher North-Holland,<br/>Publication Date 1990<br/>ISBN 9780444887016<br/>Database security : status and prospectsent://SD_ILS/0/SD_ILS:2955532024-03-29T02:27:57Z2024-03-29T02:27:57Zby Landwehr, Carl E.<br/>Author Landwehr, Carl E.<br/>Format: Books<br/>Call Number QA76.9.D32 D37 1988<br/>Publisher North Holland,<br/>Publication Date 1988<br/>ISBN 9780444704795<br/>