نتایج جستجو
Effective Oracle Database 10g Security by Design
David Knox, McGraw-Hill, 2004
Handbook Of Database Security - Applications And Trends
Michael Gertz, Sushil Jajodia, 2010
Handbook of database security : applications and trends
Michael Gertz; Sushil Jajodia, 2008
Handbook of Database Security: Applications and Trends
Michael Gertz, Michael Gertz, Sushil Jajodia, 2007
Handbook of Database Security: Applications and Trends
Michael Gertz, Michael Gertz, Sushil Jajodia, 2007
Implementing Database Security and Auditing
Ben-Natan R., 2005
Multilevel Security for Relational Databases
Faragallah, Osama S., 2014
Real World Microsoft Access Database Protection and Security
Garry Robinson, 2003
Research Directions in Database Security
Teresa F. Lunt (auth.), Teresa F. Lunt (eds.), 1992
Seeking Security: Pathogens, Open Access, and Genome Databases
Committee on Genomics Databases for Bioterrorism Threat Agents, National Research Council, 2004
Seeking Security: Pathogens, Open Access, and Genome Databases
Committee on Genomics Databases for Bioterrorism Threat Agents, National Research Council, 2004
Advances in Cryptology — ASIACRYPT’98: International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings
Arjen K. Lenstra (auth.), Kazuo Ohta, Dingyi Pei (eds.), 1998
Real-time Security Extensions for EPCglobal Networks: Case Study for the Pharmaceutical Industry
Matthieu-P. Schapranow (auth.), 2014
.NET Security
Jason Bock, Pete Stromquist, Tom Fischer, Nathan Smith (auth.), 2002
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
Eric Rzeszut, Daniel Bachrach, 2014
10 Don’ts on Your Digital Devices: The Non-Techie’s Survival Guide to Cyber Security and Privacy
Daniel G. Bachrach, Eric J. Rzeszut (auth.), 2014
