Search Results for Database security. - Narrowed by: Database security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDatabase$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity.$002509Database$002bsecurity.$0026ps$003d300?dt=list
2025-12-08T16:11:28Z
Applied Oracle security developing secure database and middleware environments
ent://SD_ILS/0/SD_ILS:293376
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Practical Oracle Security Your Unauthorized Guide to Relationial Database Security.
ent://SD_ILS/0/SD_ILS:112192
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Implementing database security and auditing a guide for DBAs, information security administrators and auditors
ent://SD_ILS/0/SD_ILS:253860
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Ben-Natan, Ron.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Database and applications security : integrating information security and data management
ent://SD_ILS/0/SD_ILS:540220
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number QA76.9 .D314 T47 2005<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Practical Oracle Security Your Unauthorized Guide to Relationial Database Security.
ent://SD_ILS/0/SD_ILS:147226
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">http://www.sciencedirect.com/science/book/9781597491983</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing SQL server protecting your database from attackers
ent://SD_ILS/0/SD_ILS:355386
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Cherry, Denny, author.<br/>Preferred Shelf Number ONLINE(355386.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128012758">http://www.sciencedirect.com/science/book/9780128012758</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure data provenance and inference control with semantic web
ent://SD_ILS/0/SD_ILS:538750
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Thuraisingham, Bhavani M., author. Cadenhead, Tyrone, author. Kantarcioglu, Murat, author. Khadilkar, Vaibhav, author.<br/>Preferred Shelf Number TK5105.88815 .T594 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781466569447">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Multilevel security for relational databases
ent://SD_ILS/0/SD_ILS:543675
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Faragallah, Osama S., author.<br/>Preferred Shelf Number QA76.9 .D314 F37 2015<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482205404">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Enterprise architecture and information assurance : developing a secure foundation
ent://SD_ILS/0/SD_ILS:538768
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Scholz, James A., author.<br/>Preferred Shelf Number QA76.9 .D314 S34 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
The complete book of data anonymization : from planning to implementation
ent://SD_ILS/0/SD_ILS:540169
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Raghunathan, Balaji., author.<br/>Preferred Shelf Number QA76.9 .A25 R338 2013<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439877319">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Securing SQL server protecting your database from attackers
ent://SD_ILS/0/SD_ILS:148981
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Cherry, Denny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499477">http://www.sciencedirect.com/science/book/9781597499477</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information security risk assessment toolkit practical assessments through data collection and data analysis
ent://SD_ILS/0/SD_ILS:145470
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Talabis, Mark. Martin, Jason.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft Office Access 2010
ent://SD_ILS/0/SD_ILS:293427
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Cronan, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-office-access-2010-quicksteps">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft SQL server 2012 a beginner's guide
ent://SD_ILS/0/SD_ILS:293232
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Petkovic, Du�san.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2012-beginners-guide-5e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Understanding big data analytics for enterprise class hadoop and streaming data
ent://SD_ILS/0/SD_ILS:293239
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Zikopoulos, Paul C. Eaton, Chris. DeRoos, Dirk. Deutsch, Thomas. Lapos, Grorge.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/understanding-big-data-analytics-for-enterprise-class-hadoop-streaming">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Web application security a beginner's guide
ent://SD_ILS/0/SD_ILS:293241
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Sullivan, Bryan, 1974- Liu, Vincent.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The healthy PC preventive care, home remedies, and green computing
ent://SD_ILS/0/SD_ILS:293464
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Securing SQL server protecting your database from attackers
ent://SD_ILS/0/SD_ILS:149034
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Cherry, Denny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Oracle database 11g DBA handbook
ent://SD_ILS/0/SD_ILS:293348
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Bryla, Bob. Loney, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/oracle-database-11g-dba-handbook">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Designing an IAM framework with Oracle identity and access management suite
ent://SD_ILS/0/SD_ILS:293289
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Scheidel, Jeff.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Microsoft SQL server 2008 a beginner's guide
ent://SD_ILS/0/SD_ILS:293313
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Petkovic, Du�san.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-beginners-guide-4e">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Databases demystified a self-teaching guide
ent://SD_ILS/0/SD_ILS:294172
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Oppel, Andrew J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/databases-demystified">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
IT auditing using controls to protect information assets
ent://SD_ILS/0/SD_ILS:293262
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Databases demystified
ent://SD_ILS/0/SD_ILS:294120
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Oppel, Andrew J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/databases-demystified-2nd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Adaptive security management architecture
ent://SD_ILS/0/SD_ILS:541852
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Tiller, James S., author.<br/>Preferred Shelf Number QA76.9 .A25 T55 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013375">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Privacy-aware knowledge discovery : novel applications and new techniques
ent://SD_ILS/0/SD_ILS:547564
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Bonchi, Francesco. Ferrari, Elena.<br/>Preferred Shelf Number QA76.9 .D314 P75 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439803660">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Security de-engineering : solving the problems in information risk management
ent://SD_ILS/0/SD_ILS:545608
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Tibble, Ian., author.<br/>Preferred Shelf Number HF5548.37 .T53 2011<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Introduction to privacy-preserving data publishing : concepts and techniques
ent://SD_ILS/0/SD_ILS:542000
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Fung, Benjamin C. M.<br/>Preferred Shelf Number QA76.9 .D314 I58 2010<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420091502">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting
ent://SD_ILS/0/SD_ILS:146775
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Hoopes, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597493055">http://www.sciencedirect.com/science/book/9781597493055</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Infosecurity 2008 threat analysis
ent://SD_ILS/0/SD_ILS:145541
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Clark, Champ, III.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Building trustworthy semantic webs
ent://SD_ILS/0/SD_ILS:541841
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number TK5105.88815 .T59 2008<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420013221">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>
How to cheat at designing security for a Windows Server 2003 network
ent://SD_ILS/0/SD_ILS:253670
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Amini, Rob. Hunter, Laura E.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Penetration tester's open source toolkit
ent://SD_ILS/0/SD_ILS:253676
2025-12-08T16:11:28Z
2025-12-08T16:11:28Z
Author Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>