نتایج جستجو
Encyclopedia of espionage, intelligence, and security Vol 3
KLee Lerner; Brenda Wilmoth Lerner, 2004
Encyclopedia of Espionage, Intelligence, and Security, A-E
K. Lee Lerner, Brenda Wilmoth Lerner, 2004
Encyclopedia of Espionage, Intelligence, and Security, F-Q
K. Lee Lerner, Brenda Wilmoth Lerner, 2004
Encyclopedia of Espionage, Intelligence, and Security, R-Z
K. Lee Lerner, Brenda Wilmoth Lerner, 2004
Database Security IX: Status and prospects
David L. Spooner, Steven A. Demurjian, John E. Dobson (eds.), 1996
Database Security XI: Status and Prospects
T. Y. Lin, Shelly Qian (eds.), 1998
Database Security XII: Status and Prospects
Anup K. Ghosh (auth.), Sushil Jajodia (eds.), 1999
Database Security: Status and prospects
Pierangela Samarati, Ravi S. Sandhu (eds.), 1997
Effective Oracle Database 10g Security by Design
David Knox, McGraw-Hill, 2004
Handbook Of Database Security - Applications And Trends
Michael Gertz, Sushil Jajodia, 2010
Handbook of database security : applications and trends
Michael Gertz; Sushil Jajodia, 2008
Handbook of Database Security: Applications and Trends
Michael Gertz, Michael Gertz, Sushil Jajodia, 2007
Handbook of Database Security: Applications and Trends
Michael Gertz, Michael Gertz, Sushil Jajodia, 2007
Implementing Database Security and Auditing
Ben-Natan R., 2005
Multilevel Security for Relational Databases
Faragallah, Osama S., 2014
Real World Microsoft Access Database Protection and Security
Garry Robinson, 2003
Research Directions in Database Security
Teresa F. Lunt (auth.), Teresa F. Lunt (eds.), 1992
Seeking Security: Pathogens, Open Access, and Genome Databases
Committee on Genomics Databases for Bioterrorism Threat Agents, National Research Council, 2004
