1. Privacy preserving data mining

by Vaidya, Jaideep | Clifton, Christopher Wade | Zhu, Yu Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2006Availability: Items available for loan: [Call number: 005.74 VAI] (1).
2. Database security and auditing : protecting data integrity and accessibility

by Afyouni, Hassan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Thomson Course Technology, 2006Availability: Items available for loan: [Call number: 005.8 AFY] (1).
3. Building trustworthy semantic webs

by Thuraisingham, Bhavani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Auerbach Publications, 2008Availability: Items available for loan: [Call number: 025.04 THU] (1).
4. Data and applications security XVII : status and prospects, IFIP TC11/WG11.3 seventeenth Annual Working Conference on Data and Applications security, August 4-6, 2003, Estes Park, Colorado, USA

by De Capitani di Vimercati, Sabrina | Ray, Indrajit | Ray, Indrakshi.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boston: Kluwer Academic Publishers, 2004Availability: Items available for loan: [Call number: 005.8 DEC] (1).
5. Secure data management : VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 2004 ; proceedings

by Jonker, Willem | Petkovic, Milan.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2004Availability: Items available for loan: [Call number: 004 JON] (1).
6. Cryptography in the database : the last line of defense

by Kenan, Kevin.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Pearson Education, 2006Availability: Items available for loan: [Call number: 005.820 KEN] (1).
7. Mastering Microsoft Access 2000 Development

by Balter, Alison.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Techmedia, 1999Availability: Items available for loan: [Call number: 005.7565 BAL] (2).
8. Teach Yourself SQL in 21 Days

by Stephens, Ryan K.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Techmedia, 2000Availability: Items available for loan: [Call number: 005.74 STE] (5).
9. Oracle e-business suite security

by Abel, John.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 2006Availability: Items available for loan: [Call number: 658.0557585 ABE] (1).
10. SQL from the Ground Up

by Pyefinch, Mary.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Tata McGraw-Hill, 1999Availability: Items available for loan: [Call number: 005.74 PYE] (1).
11. Handbook of database security : applications and trends

by Jajodia, Sushil | Gertz, Michael.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2008Availability: Items available for loan: [Call number: 005.8 GER] (1).
12. Computer security : protecting digital resources

by Newman, Robert C.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Sudbury: Jones & Bartlett, 2010Availability: Items available for loan: [Call number: 005.8 NEW] (1).
13. Database and applications security : integrating information security and data management

by Thuraisingham, Bhavani.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: Auerbach Publications, 2005Availability: Items available for loan: [Call number: 005.8 THU] (1).
14. Introduction to privacy preserving data publishing : concepts and techniques

by Fung, Benjamin C. M.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 005.8 FUN] (1).
15. Privacy-aware knowledge discovery : novel applications and new techniques

by Bonchi, Francesco | Ferrari, Elena.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Boca Raton: CRC Press, 2011Availability: Items available for loan: [Call number: 006.312 BON] (1).
16. Adaptive cryptographic access control : foreword by Sylvia L. Osborn.

by Kayem, Anne V. D. M | Akl, Selim G | Martin, Patrick.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2010Availability: Items available for loan: [Call number: 005.82 KAY] (1).
17. Preserving privacy in data outsourcing

by Foresti, Sara.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New York: Springer, 2011Availability: Items available for loan: [Call number: 005.8 FOR] (1).
18. Practical Oracle security : your unauthorized guide to relational database security

by Shaul, Josh | Ingram, Aaron.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Rockland: Syngress, 2007Availability: Items available for loan: [Call number: 005.8 SHA] (1).
19. Security, privacy and trust in modern data management

by Petkovic, Milan | Jonker, Willem.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.8 PET] (1).
20. E-Commerce Applications Using Oracle 8i and Java from Scratch

by Thakkar, Meghraj.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Delhi: Prentice Hall of India, 2000Availability: Items available for loan: [Call number: 005.74 THA] (1).

Powered by Koha