Listing 1 - 10 of 37 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Information systems --- Databases --- Security measures --- Congresses --- Computer security --- Data base security - Congresses. --- Computer security - Congresses.
Choose an application
Database security --- Bases de données --- Sécurité --- Mesures --- Bases de données --- Sécurité --- Data base security --- Database security. --- Information systems --- #KVIV:BB --- Databases --- Computer security --- Security measures
Choose an application
This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database. The book's companion Web site contains dozens of working scripts that DBA's can use to secure and automate their Oracle databases.* The only practical, hands-on guide for securing your Oracle database published by independent experts.* Companion Web site contains do
Database security. --- Oracle (Computer file) --- Data base security --- Databases --- Security measures --- Oracle7.3 --- Oracle 7.3 --- Personal Oracle7 --- Personal Oracle 7 --- Computer security
Choose an application
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book written by Denny Cherry, a Microsoft SQL MVP and one of the biggest names in SQL server today, readers learn how to properly secure a SQL server database from internal and external threats using best practi
Database security. --- SQL server. --- Client/server computing. --- Computer security. --- Information Technology --- General and Others --- Data base security --- Databases --- Computer security --- Security measures --- Microsoft SQL server
Choose an application
Blockchains (Databases) --- Bitcoin. --- Database security. --- Data base security --- Databases --- Computer security --- Cryptocurrencies --- Block chains (Databases) --- Database security --- Distributed databases --- Security measures
Choose an application
Database security. --- Digital forensic science. --- Computer and network forensics --- Computer forensics --- Digital forensics --- Network forensics --- Electronic evidence --- Forensic sciences --- Digital preservation --- Data base security --- Databases --- Computer security --- Security measures
Choose an application
Computer security --- -Database security --- -681.3*C20 --- 681.3*H20 --- Data base security --- Databases --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Congresses --- Computerwetenschap--?*C20 --- Computerwetenschap--?*H20 --- Security measures --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Database security --- 681.3*C20 --- 6813*C20 --- Access control --- Data base security - Congresses. --- Computer security - Congresses.
Listing 1 - 10 of 37 | << page >> |
Sort by
|