Search

Your search keyword '"*DATABASE security"' showing total 1,635 results

Search Constraints

Start Over You searched for: Descriptor "*DATABASE security" Remove constraint Descriptor: "*DATABASE security"
1,635 results on '"*DATABASE security"'

Search Results

201. Modern Data Strategy

202. Protecting the 2020 Census: A new framework is being used to secure the 2020 U.S. Census from database reconstruction attacks.

205. Ensuring Database Security with the Universal Basis of Relations

206. Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller

207. Web and Database Security

209. Data Governance Enables Data Management.

214. IET Information Security

215. Expectation maximization clustering and sequential pattern mining based approach for detecting intrusive transactions in databases.

216. Integrity protection method for trusted data of IoT nodes based on transfer learning.

217. A Random Label and Lightweight Hash-Based Security Authentication Mechanism for a UAV Swarm.

218. A Review of Database Security Concepts, Risks, and Problems.

219. Blockchain Technology Based Information Classiication Management Service.

220. SAP HANA Security Guide

221. Cyber Security Engineering : A Practical Approach for Systems and Software Assurance

222. Decentralized Computing Using Blockchain Technologies and Smart Contracts : Emerging Research and Opportunities

223. Big Data Analytics in Cybersecurity

224. SE-NDEND: A novel symmetric watermarking framework with neural network-based chaotic encryption for Internet of Medical Things.

225. Secure banking transaction using Blockchain.

226. INCREASING PERFORMANCE BY FLEXIBILE MANAGEMENT OF THE DATABASE

228. Property Preserving Encryption in NoSQL Wide Column Stores

229. Access Control Policies for Relational Databases in Data Exchange Process

231. Image Data Security Mechanism Based on the Internet of Things Cardiac Catheterization Laboratory Information Management System Research and Design.

232. ConcurDB: Concurrent Query Authentication for Outsourced Databases.

233. Cancelable Iris template for secure authentication based on random projection and double random phase encoding.

234. Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment.

235. CorrectMR: Authentication of Distributed SQL Execution on MapReduce.

236. Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database.

237. Frame Structure and Engineering Applications of the Multisource System Cloud Service Platform of Monitoring of the Soft Rock Tunnel.

238. Potential of blockchain approach on development and security of microbial databases.

239. New flexible quantum private query protocol against rotation noise.

240. Classification Method for Network Security Data Based on Multi-featured Extraction.

241. Pro Oracle Identity and Access Management Suite

242. Secure Data Deletion

243. Securing SQL Server : DBAs Defending the Database

244. Innovative Solutions for Access Control Management

245. SEMI-FRAGILE WATERMARKING SCHEME FOR RELATIONAL DATABASE TAMPER DETECTION.

246. PROTECTING VIRTUALIZED INFRASTRUCTURES IN CLOUD COMPUTING BASED ON BIG DATA SECURITY ANALYTICS.

249. Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks.

250. Data storage security for the Internet of Things.

Catalog

Books, media, physical & digital resources