|
1.
|
Privacy preserving data mining
by Vaidya, Jaideep | Clifton, Christopher Wade | Zhu, Yu Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.74 VAI] (1).
|
|
2.
|
Database security and auditing : protecting data integrity and accessibility
by Afyouni, Hassan A. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Thomson Course Technology, 2006Availability: Items available for loan: [Call number: 005.8 AFY] (1).
|
|
3.
|
Building trustworthy semantic webs
by Thuraisingham, Bhavani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 025.04 THU] (1).
|
|
4.
|
Data and applications security XVII : status and prospects, IFIP TC11/WG11.3 seventeenth Annual Working Conference on Data and Applications security, August 4-6, 2003, Estes Park, Colorado, USA
by De Capitani di Vimercati, Sabrina | Ray, Indrajit | Ray, Indrakshi. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boston: Kluwer Academic Publishers, 2004Availability: Items available for loan: [Call number: 005.8 DEC] (1).
|
|
5.
|
Secure data management : VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 2004 ; proceedings
by Jonker, Willem | Petkovic, Milan. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 JON] (1).
|
|
6.
|
Cryptography in the database : the last line of defense
by Kenan, Kevin. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.820 KEN] (1).
|
|
7.
|
Mastering Microsoft Access 2000 Development
by Balter, Alison. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Techmedia, 1999Availability: Items available for loan: [Call number: 005.7565 BAL] (2).
|
|
8.
|
Teach Yourself SQL in 21 Days
by Stephens, Ryan K. Edition: 3rd ed.Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Techmedia, 2000Availability: Items available for loan: [Call number: 005.74 STE] (5).
|
|
9.
|
Oracle e-business suite security
by Abel, John. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 658.0557585 ABE] (1).
|
|
10.
|
SQL from the Ground Up
by Pyefinch, Mary. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 005.74 PYE] (1).
|
|
11.
|
Handbook of database security : applications and trends
by Jajodia, Sushil | Gertz, Michael. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
|
|
12.
|
Computer security : protecting digital resources
by Newman, Robert C. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
|
|
13.
|
Database and applications security : integrating information security and data management
by Thuraisingham, Bhavani. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 THU] (1).
|
|
14.
|
Introduction to privacy preserving data publishing : concepts and techniques
by Fung, Benjamin C. M. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 FUN] (1).
|
|
15.
|
Privacy-aware knowledge discovery : novel applications and new techniques
by Bonchi, Francesco | Ferrari, Elena. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 006.312 BON] (1).
|
|
16.
|
Adaptive cryptographic access control : foreword by Sylvia L. Osborn.
by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
|
|
17.
|
Preserving privacy in data outsourcing
by Foresti, Sara. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
|
|
18.
|
Practical Oracle security : your unauthorized guide to relational database security
by Shaul, Josh | Ingram, Aaron. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (1).
|
|
19.
|
Security, privacy and trust in modern data management
by Petkovic, Milan | Jonker, Willem. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 PET] (1).
|
|
20.
|
E-Commerce Applications Using Oracle 8i and Java from Scratch
by Thakkar, Meghraj. Material type: Book; Format:
print
; Literary form:
Not fiction
Publisher: New Delhi: Prentice Hall of India, 2000Availability: Items available for loan: [Call number: 005.74 THA] (1).
|