1. Data and applications security and privacy XXVI
Author: Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data protection, Congresses,Database security, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
D314
I34
2012eb


2. Database security and auditing
Author: Hassan A Afyouni,
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security,Data protection,Database security
Classification :
QA
,
76
.
9
,.
A25A56
,
2006


3. Expert Oracle and Java security :
Author: David Coffin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Oracle (Computer file),Data encryption (Computer science),Data protection,Database security,Java (Computer program language)
Classification :
QA76
.
9
.
D314
C64
2011


4. Hadoop security /
Author: Ben Spivey & Joey Echeverria
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D5


5. How to Secure and Audit Oracle 10g and 11g
Author: \ Ron Ben Natan; Foreword by Pete Finnigan
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data protection,Database security,امنیت کامپیوتر,حفاظت دادهها,پایگاههای اطلاعاتی -- امنیت
Classification :
E-Book
,

6. How to secure and audit Oracle 10g and 11g
Author: Ben-Natan, Ron
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Oracle (Computer file) ► Computer security ► Data protection ► Database security
Classification :
76
.
9
.
A25
B446

7. Implementing database security and auditing
Author: / Roy [i.e. Ron] Ben Natan
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Data protection,Database security
Classification :
QA76
.
9
.
A25
,
B45
2005


8. Infosecurity 2008 threat analysis /
Author: [authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computers-- Access control,Data protection,Database security,Telecommunication-- Security measures

9. Practical Hadoop security /
Author: Bhushan Lakhe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop,Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D314
L35
2014


10. Privacy-preserving data mining :
Author: edited by Charu C. Aggarwal and Philip S. Yu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data mining.,Data protection.,Computer security.,Computer security.,COMPUTERS-- Database Management-- Data Mining.,Data mining.,Data mining.,Data protection.,Data protection.,Informatique.
Classification :
QA76
.
9
.
D343
P75
2008eb


11. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3178


12. Secure data management : second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3674


13. The complete book of data anonymization :
Author: Balaji Raghunathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Database management.,Database security.
Classification :
QA76
.
9
.
A25
.
R338
2013


14. امنیت پایگاه داده
Author: / تاليف عينالله جعفرنژادقمی.,جعفرنژاد قمی
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: شبکههای کامپیوتری,Computer networks,اینترنت ,Internet,حفاظت دادهها,Data protection,پایگاههای اطلاعاتی,Database security, -- تدابیر ایمنی, -- Security measures, -- تدابیر ایمنی, -- Security measures, -- امنیت,a01,a01,a02,a02,a03,a03,a04,a04
Classification :
TK
۵۱۰۵
/
۵۹
/
ج
۷
الف
۸


15. امنیت پایگاه داده
Author: / تاليف عين الله جعفرنژادقمی.,جعفرنژاد قمی
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: شبکههای کامپیوتری,Computer networks,حفاظت دادهها,Data protection,پایگاههای اطلاعاتی,Database security, -- تدابیر ایمنی, -- Security measures, -- امنیت,a01,a01,a03,a03,a04,a04,پایگاه های اطلاعاتی - تدابیر ایمنی
Classification :
TK
۵۱۰۵
/
۵۹
/
ج
۷۷
الف
۸ ۱۳۹۸

