Search Results for Database security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDatabase$002bsecurity.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-05-12T08:45:05Z Handbook of Database Security Applications and Trends ent://SD_ILS/0/SD_ILS:166409 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Gertz, Michael. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:399827 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Ray, Indrajit. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Expert Oracle and Java Security Programming Secure Oracle Database Applications with Java ent://SD_ILS/0/SD_ILS:171629 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Coffin, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-3832-4">http://dx.doi.org/10.1007/978-1-4302-3832-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Oracle security developing secure database and middleware environments ent://SD_ILS/0/SD_ILS:293376 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Knox, David (David C.)&#160;Gaetjen, Scott.&#160;Jahangir, Hamza.&#160;Muth, Tyler.&#160;Sack, Patrick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Oracle Security Your Unauthorized Guide to Relationial Database Security. ent://SD_ILS/0/SD_ILS:112192 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing database security and auditing a guide for DBAs, information security administrators and auditors ent://SD_ILS/0/SD_ILS:253860 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Ben-Natan, Ron.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and applications security integrating information security and data management ent://SD_ILS/0/SD_ILS:284552 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Oracle Security Your Unauthorized Guide to Relationial Database Security. ent://SD_ILS/0/SD_ILS:147226 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">http://www.sciencedirect.com/science/book/9781597491983</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:355386 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Cherry, Denny, author.<br/>Preferred Shelf Number&#160;ONLINE(355386.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128012758">http://www.sciencedirect.com/science/book/9780128012758</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure data provenance and inference control with semantic web ent://SD_ILS/0/SD_ILS:356424 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Thuraisingham, Bhavani M., author.&#160;Cadenhead, Tyrone, author.&#160;Kantarcioglu, Murat, author.&#160;Khadilkar, Vaibhav, author.<br/>Preferred Shelf Number&#160;ONLINE(356424.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466569447">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multilevel security for relational databases ent://SD_ILS/0/SD_ILS:356433 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Faragallah, Osama S., author.<br/>Preferred Shelf Number&#160;ONLINE(356433.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482205404">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:289995 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439841600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete book of data anonymization from planning to implementation ent://SD_ILS/0/SD_ILS:289065 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Raghunathan, Balaji.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook on mobile and ubiquitous computing status and perspective ent://SD_ILS/0/SD_ILS:286262 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Yang, Laurence Tianruo.&#160;Syukur, Evi.&#160;Loke, Seng.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439848128">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security risk assessment toolkit practical assessments through data collection and data analysis ent://SD_ILS/0/SD_ILS:145470 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Talabis, Mark.&#160;Martin, Jason.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:148981 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Cherry, Denny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499477">http://www.sciencedirect.com/science/book/9781597499477</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft Office Access 2010 ent://SD_ILS/0/SD_ILS:293427 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Cronan, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-office-access-2010-quicksteps">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The healthy PC preventive care, home remedies, and green computing ent://SD_ILS/0/SD_ILS:293464 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Hart-Davis, Guy.&#160;Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft SQL server 2012 a beginner's guide ent://SD_ILS/0/SD_ILS:293232 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Petkovic, Du&#65533;san.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2012-beginners-guide-5e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding big data analytics for enterprise class hadoop and streaming data ent://SD_ILS/0/SD_ILS:293239 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Zikopoulos, Paul C.&#160;Eaton, Chris.&#160;DeRoos, Dirk.&#160;Deutsch, Thomas.&#160;Lapos, Grorge.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/understanding-big-data-analytics-for-enterprise-class-hadoop-streaming">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web application security a beginner's guide ent://SD_ILS/0/SD_ILS:293241 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Sullivan, Bryan, 1974-&#160;Liu, Vincent.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing SQL server protecting your database from attackers ent://SD_ILS/0/SD_ILS:149034 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Cherry, Denny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security de-engineering solving the problems in information risk management ent://SD_ILS/0/SD_ILS:286209 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Tibble, Ian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Oracle database 11g DBA handbook ent://SD_ILS/0/SD_ILS:293348 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Bryla, Bob.&#160;Loney, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/oracle-database-11g-dba-handbook">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Databases demystified ent://SD_ILS/0/SD_ILS:294120 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Oppel, Andrew J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/databases-demystified-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Databases demystified a self-teaching guide ent://SD_ILS/0/SD_ILS:294172 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Oppel, Andrew J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/databases-demystified">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive security management architecture ent://SD_ILS/0/SD_ILS:288451 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Tiller, James S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-aware knowledge discovery novel applications and new techniques ent://SD_ILS/0/SD_ILS:287859 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Bonchi, Francesco.&#160;Ferrari, Elena.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439803660">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT auditing using controls to protect information assets ent://SD_ILS/0/SD_ILS:293262 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Davis, Chris (Christopher Michael)&#160;Schiller, Mike.&#160;Wheeler, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing an IAM framework with Oracle identity and access management suite ent://SD_ILS/0/SD_ILS:293289 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Scheidel, Jeff.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Microsoft SQL server 2008 a beginner's guide ent://SD_ILS/0/SD_ILS:293313 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Petkovic, Du&#65533;san.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-beginners-guide-4e">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to privacy-preserving data publishing concepts and techniques ent://SD_ILS/0/SD_ILS:288787 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Fung, Benjamin C. M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420091502">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting ent://SD_ILS/0/SD_ILS:146775 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Hoopes, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597493055">http://www.sciencedirect.com/science/book/9781597493055</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Infosecurity 2008 threat analysis ent://SD_ILS/0/SD_ILS:145541 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Clark, Champ, III.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building trustworthy semantic webs ent://SD_ILS/0/SD_ILS:289418 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Thuraisingham, Bhavani M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> How to cheat at designing security for a Windows Server 2003 network ent://SD_ILS/0/SD_ILS:253670 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Amini, Rob.&#160;Hunter, Laura E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Penetration tester's open source toolkit ent://SD_ILS/0/SD_ILS:253676 2024-05-12T08:45:05Z 2024-05-12T08:45:05Z Author&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>