1. A management approach to data base applications
Author: / david avison, christine cuthbertson
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Database management,Computer security- United States,United States.- Privacy Act of 1974
Classification :
QC100
.
A857
2002


2. A survey of data leakage detection and prevention solutions
Author: Asaf Shabtai, Yuval Elovici, Lior Rokach
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection,Database management,Database security
Classification :
QA76
.
9
.
A25
S46
2012eb


3. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24


4. Adaptive cryptographic access control /
Author: Anne V.D.M. Kayem, Selim G. Akl, Patrick Martinches
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Computers-- Access control,Data encryption (Computer science),Database security
Classification :
QA76
.
9
.
A25
K39
2010eb


5. Advancing cloud database systems and capacity planning with dynamic applications
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Data warehousing--Planning,Cloud computing,Database security
Classification :
QA76
.
9
.
D37
A355
2017


6. Applied Oracle security
Author: \ David C. Knox ... [et al.]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Oracle (Computer file),Computer security,Database security,اوراکل (برنامه کامپیوتر),امنیت رایانهای,پایگاههای اطلاعاتی -- امنیت
Classification :
E-Book
,

7. Big data analytics in cybersecurity
Author: edited by Onur Savas, Julia Deng.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Big data.,Database security.,Computer networks,Information technology,Security measures.,Management.
Classification :
QA76
.
9
.
A25
B538
2017


8. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017


9. Building Ethereum Dapps :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Electronic data processing ; Distributed processing. ; Blockchains (Databases) ; Database security. ; Web applications. ;

10. Building trustworthy semantic webs /
Author: Bhavani Thuraisingham.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Database security.,Semantic Web.,COMPUTERS-- Online Services.,COMPUTERS-- System Administration-- Storage & Retrieval.,Database security.,Semantic Web.
Classification :
TK5105
.
88815
T59
2008eb


11. Check Point N
Author: / Drew Simonis ... [et al.
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computers--Access control,Database security.
Classification :
QA
,
76
.
9
,.
A25
,
C454
,
2002b


12. Computer Information Systems and Industrial Management
Author: \ Khalid Saeed, Władysław Homenda (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management -- Congresses.,شبکه های کامپیوتری - کنگره ها.,شبکه های کامپیوتری - اقدامات امنیتی - کنگره ها,مدیریت پایگاه داده - کنگره ها
Classification :
QA
164
.
C657
2015
E-Book
,


13. Computer information systems and industrial management
Author: / Agostino Cortesi ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Congresses,Computer networks--Security measures--Congresses,Database management--Congresses
Classification :
TK5105
.
5
.
I58
2012


14. Computer information systems and industrial management :
Author: Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Sławomir Wierzchoń (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer networks, Congresses,Database management, Congresses
Classification :
TK5105
.
5
.
I58
2013


15. Computer security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Database security.,Computer security,Computer networks--Security measures
Classification :
QA
76
.
9
.
D314
N49
2010


16. Computer security: protecting digital resources
Author: Newman, Robert C.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Database security,، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
D314
N49


17. Cryptography for Internet and database applications
Author: / Nick Galbreath,Galbreath
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security,Cryptography,Database security,Internet -- Sceurity measures,Java (Computer program language)
Classification :
QA
76
.
9
.
A25G35
2002


18. Cryptography for Internet and database applications : developing secret and public key techniques with Java
Author: Galbreath, Nick, 1970-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Cryptography ► Database security ► Internet- Security measures ► Java (Computer program language)
Classification :
005
G148c


19. Data and Applications Security and Privacy XXIX
Author: \ Pierangela Samarati (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,پایگاههای اطلاعاتی -- مدیریت
Classification :
QA
76
.
9
.
A25D32
2015
E-Book
,


20. Data and applications securit
Author: / edited by Bhavani Thuraisingham ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Database security--Congresses
Classification :
QA
,
76
.
9
,.
D314
,
I34
,
2000eb

