Resultados da pesquisa - "Database security."

  • A mostrar 1 - 8 resultados de 8
Refinar resultados
  1. 1

    Data and applications security developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 200...

    Publicado em 2001
    Assuntos: “...Database security Congresses....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico Conference Proceeding livro electrónico
  2. 2

    Implementing database security and auditing Por Ben-Natan, Ron

    Publicado em 2005
    Assuntos: “...Database security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  3. 3

    Check Point NG next generation security administration /

    Publicado em 2002
    Assuntos: “...Database security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  4. 4

    IBM Tivoli storage resource manager a practical introduction /

    Publicado em 2003
    Assuntos: “...Database security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  5. 5

    Safeguarding critical e-documents implementing a program for securing confidential information assets / Por Smallwood, Robert F., 1959-

    Publicado em 2012
    Assuntos: “...Database security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  6. 6

    How to cheat at designing security for a Windows Server 2003 network Por Amini, Rob

    Publicado em 2006
    Assuntos: “...Database security....”
    An electronic book accessible through the World Wide Web; click to view
    Recurso Electrónico livro electrónico
  7. 7

    Cyber security engineering : a practical approach for systems and software assurance / Por Mead, Nancy R.

    Publicado em 2016
    Assuntos: “...Database security 248...”
    Livro
  8. 8