Search Results for Information security. - Narrowed by: Database management. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Database$002bmanagement.$002509Database$002bmanagement.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-01-18T00:07:57Z Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484509 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Garg, Deepak. editor. (orcid)0000-0002-0888-3093&#160;Kumar, N. V. Narendra. editor.&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and applications security : integrating information security and data management ent://SD_ILS/0/SD_ILS:540220 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 T47 2005<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203486061">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Preserving Privacy in Data Outsourcing ent://SD_ILS/0/SD_ILS:172941 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Foresti, Sara. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7659-8">http://dx.doi.org/10.1007/978-1-4419-7659-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adaptive Cryptographic Access Control ent://SD_ILS/0/SD_ILS:172654 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Kayem, Anne V. D. M. author.&#160;Akl, Selim G. author.&#160;Martin, Patrick. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management in Decentralized Systems ent://SD_ILS/0/SD_ILS:165430 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Yu, Ting. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preserving Privacy in On-Line Analytical Processing (OLAP) ent://SD_ILS/0/SD_ILS:166336 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Wang, Lingyu. author.&#160;Jajodia, Sushil. author.&#160;Wijesekera, Duminda. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:166379 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Preserving Data Mining ent://SD_ILS/0/SD_ILS:165653 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Vaidya, Jaideep. author.&#160;Zhu, Yu Michael. author.&#160;Clifton, Christopher W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality of Protection Security Measurements and Metrics ent://SD_ILS/0/SD_ILS:166159 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Gollmann, Dieter. editor.&#160;Massacci, Fabio. editor.&#160;Yautsiukhin, Artsiom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-36584-8">http://dx.doi.org/10.1007/978-0-387-36584-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data governance : creating value from information assets ent://SD_ILS/0/SD_ILS:543786 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Bhansali, Neera.<br/>Preferred Shelf Number&#160;QA76.9 .D3 D1559135 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439879146">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Managing and mining multimedia databases ent://SD_ILS/0/SD_ILS:542852 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D3 T458 2001<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420042559">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Designing a total data solution : technology, implementation and deployment ent://SD_ILS/0/SD_ILS:539358 2026-01-18T00:07:57Z 2026-01-18T00:07:57Z Author&#160;Breakfield, Charles V.&#160;Burkey, Roxanne E.<br/>Preferred Shelf Number&#160;QA76.9 .D26 D48 2000<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203997512">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>