Search

Your search keyword '"*DATABASE security"' showing total 49 results

Search Constraints

Start Over You searched for: Descriptor "*DATABASE security" Remove constraint Descriptor: "*DATABASE security" Topic security systems Remove constraint Topic: security systems
49 results on '"*DATABASE security"'

Search Results

1. Data security and data transmission delay trade-offs inhealthcare blockchain techniques.

2. Design and implementation of vehicle security module using touch key and RFID.

3. An ontology-based secure design framework for graph-based databases.

4. Browser Security: Appearances Can Be Deceiving.

5. Data Services.

6. INFORMATION SECURITY AND RISK MANAGEMENT.

7. Better-Than-Nothing Security Practices.

8. Saving Big Data from Itself.

9. A Novel Minutiae Triangulation Technique for Non-invertible Fingerprint Template Generation.

10. A QUANTUM CRYPTOGRAPHIC SOLUTION TO THE PROBLEM OF ACCESS CONTROL IN A HIERARCHY.

11. Theoretical aspects of information security.

12. DiSC: Benchmarking Secure Chip DBMS.

13. Privacy-Preserving String Comparisons in Record Linkage Systems: A Review.

14. Corporate Expectations of the IT Department in an Age of Terrorism: Ensuring “Battle Readiness”.

15. Biometric Authentication for Border Control Applications.

16. A Thin-Plate Spline Calibration Model for Fingerprint Sensor Interoperability.

17. Engineering a Policy-Based System for Federated Healthcare Databases.

18. ‘Code’: Privacy's death or saviour?

19. Data Element Security and Its Effects on File Segmentation.

20. DATABASE SECURITY.

21. Systolic inversion algorithms for building cryptographic systems based on security measurement in IoT-based advanced manufacturing.

22. Under lock and key – keeping sensitive data where it belongs

23. Recent progress in database privacy

24. Analysis of China's energy security evaluation system: Based on the energy security data from 30 provinces from 2010 to 2016.

25. Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.

26. Database Security.

27. Implementing Information Lifecycle Security (ILS).

28. PENETRATION TESTING DIGS DEEPER.

29. DNS: DEFENDING YOUR DOMAIN.

30. Application Security Inc.

31. Pay heed to 802.11n security.

32. IBM 'SMashes' Web 2.0 security risks.

33. Security apps can't weather Storm.

34. APPDETECTIVEPRO GETS RUSSIAN SECURITY CERTIFICATION.

35. Would You Accept a Bar Code Implant?

36. Dangerous databases at large.

37. RSS' security deadline.

38. MICROSOFT'S EARLY WARNING.

39. Europe Zips Lips; U.S. Sells ZIPs.

40. U.P.S. Loses A Shipment Of Citigroup Client Data.

41. Personal Data For the Taking.

42. Spyware Is Easy to Get, Difficult to Remove, Increasingly Malicious.

43. Users Plan for Quick Oracle 11g Upgrades.

44. Compromise DRM Better Than None.

45. Quack Hackers.

46. Data Security Policies Need Focus, Execs Say.

47. SECURITY LOG.

48. British Bug Hunter Finds 34 Flaws in Oracle Apps.

49. Matching Crypto Strength.

Catalog

Books, media, physical & digital resources