Arama Sonuçları Database. - Daraltılmış: Database security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dDatabase.$0026qf$003dSUBJECT$002509Konu$002509Database$002bsecurity.$002509Database$002bsecurity.$0026pe$003dd$00253A$0026ps$003d300$0026isd$003dtrue?2024-11-18T21:31:20ZOracle database 11g DBA handbookent://SD_ILS/0/SD_ILS:2933482024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Bryla, Bob. Loney, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/oracle-database-11g-dba-handbook">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:3553862024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Cherry, Denny, author.<br/>Yer Numarası ONLINE(355386.1)<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128012758">http://www.sciencedirect.com/science/book/9780128012758</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:1489812024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Cherry, Denny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499477">http://www.sciencedirect.com/science/book/9781597499477</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing SQL server protecting your database from attackersent://SD_ILS/0/SD_ILS:1490342024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Cherry, Denny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496254">http://www.sciencedirect.com/science/book/9781597496254</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Applied Oracle security developing secure database and middleware environmentsent://SD_ILS/0/SD_ILS:2933762024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Knox, David (David C.) Gaetjen, Scott. Jahangir, Hamza. Muth, Tyler. Sack, Patrick.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/applied-oracle-security-developing-secure-database-middleware-environments">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical Oracle Security Your Unauthorized Guide to Relationial Database Security.ent://SD_ILS/0/SD_ILS:1121922024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar ScienceDirect (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Database and applications security integrating information security and data managementent://SD_ILS/0/SD_ILS:2845522024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Implementing database security and auditing a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:2538602024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Ben-Natan, Ron.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781555583347">http://www.sciencedirect.com/science/book/9781555583347</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Practical Oracle Security Your Unauthorized Guide to Relationial Database Security.ent://SD_ILS/0/SD_ILS:1472262024-11-18T21:31:20Z2024-11-18T21:31:20ZYer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491983">http://www.sciencedirect.com/science/book/9781597491983</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure data provenance and inference control with semantic webent://SD_ILS/0/SD_ILS:3564242024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Thuraisingham, Bhavani M., author. Cadenhead, Tyrone, author. Kantarcioglu, Murat, author. Khadilkar, Vaibhav, author.<br/>Yer Numarası ONLINE(356424.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466569447">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Multilevel security for relational databasesent://SD_ILS/0/SD_ILS:3564332024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Faragallah, Osama S., author.<br/>Yer Numarası ONLINE(356433.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781482205404">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Enterprise architecture and information assurance : developing a secure foundationent://SD_ILS/0/SD_ILS:2899952024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Scholz, James A., author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439841600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The complete book of data anonymization from planning to implementationent://SD_ILS/0/SD_ILS:2890652024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Raghunathan, Balaji.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information security risk assessment toolkit practical assessments through data collection and data analysisent://SD_ILS/0/SD_ILS:1454702024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Talabis, Mark. Martin, Jason.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497350">http://www.sciencedirect.com/science/book/9781597497350</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft Office Access 2010ent://SD_ILS/0/SD_ILS:2934272024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Cronan, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/microsoft-office-access-2010-quicksteps">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>The healthy PC preventive care, home remedies, and green computingent://SD_ILS/0/SD_ILS:2934642024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Hart-Davis, Guy. Holzman, Carey. Healthy PC.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/healthy-pc-preventive-care-home-remedies-green-computing-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft SQL server 2012 a beginner's guideent://SD_ILS/0/SD_ILS:2932322024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Petkovic, Du�san.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2012-beginners-guide-5e">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Understanding big data analytics for enterprise class hadoop and streaming dataent://SD_ILS/0/SD_ILS:2932392024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Zikopoulos, Paul C. Eaton, Chris. DeRoos, Dirk. Deutsch, Thomas. Lapos, Grorge.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/understanding-big-data-analytics-for-enterprise-class-hadoop-streaming">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web application security a beginner's guideent://SD_ILS/0/SD_ILS:2932412024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Sullivan, Bryan, 1974- Liu, Vincent.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/web-application-security-beginners-guide">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Databases demystifiedent://SD_ILS/0/SD_ILS:2941202024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Oppel, Andrew J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/databases-demystified-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Databases demystified a self-teaching guideent://SD_ILS/0/SD_ILS:2941722024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Oppel, Andrew J.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/databases-demystified">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security de-engineering solving the problems in information risk managementent://SD_ILS/0/SD_ILS:2862092024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Tibble, Ian.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439868355">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Privacy-aware knowledge discovery novel applications and new techniquesent://SD_ILS/0/SD_ILS:2878592024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Bonchi, Francesco. Ferrari, Elena.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439803660">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Adaptive security management architectureent://SD_ILS/0/SD_ILS:2884512024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Tiller, James S.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013375">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>IT auditing using controls to protect information assetsent://SD_ILS/0/SD_ILS:2932622024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Davis, Chris (Christopher Michael) Schiller, Mike. Wheeler, Kevin.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/auditing-using-controls-to-protect-information-assets-2nd-edition">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:2932892024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Scheidel, Jeff.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/designing-iam-framework-oracle-identity-access-management-suite">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Microsoft SQL server 2008 a beginner's guideent://SD_ILS/0/SD_ILS:2933132024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Petkovic, Du�san.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/microsoft-sql-server-2008-beginners-guide-4e">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Introduction to privacy-preserving data publishing concepts and techniquesent://SD_ILS/0/SD_ILS:2887872024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Fung, Benjamin C. M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420091502">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Virtualization for security including sandboxing, disaster recovery, high availability, forensic analysis, and honeypottingent://SD_ILS/0/SD_ILS:1467752024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Hoopes, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597493055">http://www.sciencedirect.com/science/book/9781597493055</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Infosecurity 2008 threat analysisent://SD_ILS/0/SD_ILS:1455412024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Clark, Champ, III.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492249">http://www.sciencedirect.com/science/book/9781597492249</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Building trustworthy semantic websent://SD_ILS/0/SD_ILS:2894182024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>How to cheat at designing security for a Windows Server 2003 networkent://SD_ILS/0/SD_ILS:2536702024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Amini, Rob. Hunter, Laura E.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492430">http://www.sciencedirect.com/science/book/9781597492430</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Penetration tester's open source toolkitent://SD_ILS/0/SD_ILS:2536762024-11-18T21:31:20Z2024-11-18T21:31:20ZYazar Long, Johnny.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490214">http://www.sciencedirect.com/science/book/9781597490214</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>