Search Results for Database management - Narrowed by: Open Access Book - Database securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dDatabase$002bmanagement$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity$002509Database$002bsecurity$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-16T15:46:41ZDatabase systems : design, implementation, and managementent://SD_ILS/0/SD_ILS:8242422024-06-16T15:46:41Z2024-06-16T15:46:41Zby Coronel, Carlos.<br/>Author Coronel, Carlos., Morris, Steven<br/>Format: Books<br/>Call Number QA76.9.D26 C67 2015 f<br/>Edition 11th Ed.<br/>Publisher Cengage Learning,<br/>Publication Date 2015<br/>ISBN 9781285196145<br/>Design and implementation of a cryptographically more secure database management systement://SD_ILS/0/SD_ILS:7708832024-06-16T15:46:41Z2024-06-16T15:46:41Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 Z35 2007 af<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Database and applications security : integrating information security and data managementent://SD_ILS/0/SD_ILS:4820222024-06-16T15:46:41Z2024-06-16T15:46:41Zby Thuraisingham, Bhavani<br/>Author Thuraisingham, Bhavani<br/>Format: Books<br/>Call Number QA76.9.D314 T48 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005<br/>ISBN 9780849322242<br/>Some notes on authorization and transaction management in distributed database systemsent://SD_ILS/0/SD_ILS:6408022024-06-16T15:46:41Z2024-06-16T15:46:41Zby Pluimakers, G. M. J.<br/>Author Pluimakers, G. M. J.<br/>Format: Books<br/>Call Number MAK 16870<br/>Publication Date 1988<br/>Multilevel security issues in distributed database management systemsent://SD_ILS/0/SD_ILS:6433962024-06-16T15:46:41Z2024-06-16T15:46:41Zby McHugh, John<br/>Author McHugh, John, Bhavani M. Thuraisingham<br/>Format: Books<br/>Call Number MAK 17222<br/>Publication Date 1988<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:8211382024-06-16T15:46:41Z2024-06-16T15:46:41Zby Scholz, James A.<br/>Author Scholz, James A.<br/>Format: Books<br/>Call Number QA76.9.D314 S34 2014<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2014<br/>ISBN 9781439841594<br/>A survey of data leakage detection and prevention solutionsent://SD_ILS/0/SD_ILS:8084752024-06-16T15:46:41Z2024-06-16T15:46:41Zby Shabtai, Asaf<br/>Author Shabtai, Asaf, Elovici, Yuval, Rokach, Lior<br/>Format: Books<br/>Call Number QA76.9.A25 S46 2012<br/>Publisher Springer,<br/>Publication Date 2012<br/>ISBN 9781461420521 9781461420538<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:8507512024-06-16T15:46:41Z2024-06-16T15:46:41Zby Scheidel, Jeff, author<br/>Author Scheidel, Jeff, author<br/>Format: Books<br/>Call Number QA76.9.A25 S337 2010<br/>Publisher Oracle/McGraw-Hill,<br/>Publication Date 2010<br/>ISBN 9780071741378<br/>Secure data management in decentralized systemsent://SD_ILS/0/SD_ILS:1580522024-06-16T15:46:41Z2024-06-16T15:46:41Zby Yu, Ting<br/>Author Yu, Ting, Jajodia, Sushil<br/>Format: Books<br/>Call Number TK5105.59 S424 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387276946<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">Fulltext</a><br/>Database security and auditing : protecting data integrity and accessibilityent://SD_ILS/0/SD_ILS:4360982024-06-16T15:46:41Z2024-06-16T15:46:41Zby Afyouni, Hassan A.<br/>Author Afyouni, Hassan A.<br/>Format: Books<br/>Call Number QA76.9.D314 A39 2006<br/>Publisher Thomson/Course Technology,<br/>Publication Date 2006<br/>ISBN 9780619215590<br/>Data rescue!!ent://SD_ILS/0/SD_ILS:4508762024-06-16T15:46:41Z2024-06-16T15:46:41ZFormat: Books<br/>Call Number QA763.9.D314 D37 2006<br/>Publisher Venton Publishing (M) Sdn. Bhd.,<br/>Publication Date 2006<br/>ISBN 9789832661917<br/>The development of a commercially viable database encryption tool for oracle8i RDBMSent://SD_ILS/0/SD_ILS:3728212024-06-16T15:46:41Z2024-06-16T15:46:41Zby Mohd. Nazri Kama, 1963-<br/>Author Mohd. Nazri Kama, 1963-, Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 M53 2006 af<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>ISBN 9789673533435<br/>Continuous auditing of database applications : an embedded audit module approachent://SD_ILS/0/SD_ILS:3965102024-06-16T15:46:41Z2024-06-16T15:46:41Zby Groomer, S. Michael<br/>Author Groomer, S. Michael, Murthy, Uday S.<br/>Format: Books<br/>Call Number MAK 15902<br/>Publication Date 1989<br/>The Complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:8372982024-06-16T15:46:41Z2024-06-16T15:46:41Zby Raghunathan, Balaji author<br/>Author Raghunathan, Balaji author<br/>Format: Books<br/>Call Number QA76.9.A25 R348 2013<br/>ISBN 9781439877302<br/>