Listing 1 - 10 of 246 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
Choose an application
681.3*H2 --- 681.3*A0 --- Database management: security integrity protection--See also {?681.5*E5} --- General --- Information Technology --- Computer Science (Hardware & Networks) --- 681.3*A0 General --- 681.3*H2 Database management: security integrity protection--See also {?681.5*E5} --- Database management: security; integrity; protection--See also {?681.5*E5} --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5}
Choose an application
"This book introduces the fundamental concepts necessary for designing, using, and implementing database systems and database applications. Our presentation stresses the fundamentals of database modeling and design, the languages and models provided by the database management systems, and database system implementation techniques"--Page vii.
681.3*H2 --- 681.3*H2 Database management: security integrity protection--See also {?681.5*E5} --- Database management: security integrity protection--See also {?681.5*E5} --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- Database management: security; integrity; protection--See also {?681.5*E5} --- Database management
Choose an application
681.3*H2 --- 681.3*H2 Database management: security integrity protection--See also {?681.5*E5} --- Database management: security integrity protection--See also {?681.5*E5} --- #TCPW P4.0 --- #TCPW P4.2 --- 681.3*H2 Database management: security; integrity; protection--See also {?681.5*E5} --- Database management: security; integrity; protection--See also {?681.5*E5} --- Information systems --- Database management --- 681.3*H20 --- Computerwetenschap--?*H20
Listing 1 - 10 of 246 | << page >> |
Sort by
|