Search Results for Database security. - Narrowed by: 2011
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDatabase$002bsecurity.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092011$0025092011$0026te$003dILS$0026ps$003d300?dt=list
2024-12-23T02:03:41Z
Expert Oracle and Java Security Programming Secure Oracle Database Applications with Java
ent://SD_ILS/0/SD_ILS:171629
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Coffin, David. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4302-3832-4">http://dx.doi.org/10.1007/978-1-4302-3832-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Applied Oracle security developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:293376
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security de-engineering solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:286209
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Tibble, Ian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:288451
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Tiller, James S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-aware knowledge discovery novel applications and new techniques
ent://SD_ILS/0/SD_ILS:287859
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Bonchi, Francesco. Ferrari, Elena.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439803660">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle database 11g DBA handbook
ent://SD_ILS/0/SD_ILS:293348
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Bryla, Bob. Loney, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-database-11g-dba-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Databases demystified
ent://SD_ILS/0/SD_ILS:294120
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Oppel, Andrew J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/databases-demystified-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Databases demystified a self-teaching guide
ent://SD_ILS/0/SD_ILS:294172
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Oppel, Andrew J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/databases-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing SQL server protecting your database from attackers
ent://SD_ILS/0/SD_ILS:149034
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Cherry, Denny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing an IAM framework with Oracle identity and access management suite
ent://SD_ILS/0/SD_ILS:293289
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft SQL server 2008 a beginner's guide
ent://SD_ILS/0/SD_ILS:293313
2024-12-23T02:03:41Z
2024-12-23T02:03:41Z
Author Petkovic, Du�san.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-beginners-guide-4e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>