Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
62 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Chen, Hsinchun.
      Format: 
      Excerpt: 
      approaches.  It will bring useful knowledge to scientists, security professionals, counterterrorism experts
      by 
      Wun-Young, Leslie.
      Format: 
      Excerpt: 
      SAP Security Introduction; Authorization Concept and Security Mechanics; Security Administration
      by 
      Harrington, Jan L.
      Format: 
      Excerpt: 
      -- Chapter 10: Using CASE Tools for Database Design -- Chapter 11: Database Design Case Study #1:Database
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      techniques. Review Document Grinding and Database Digging See the ways to use Google to locate documents and
      by 
      International Conference on Very Large Data Bases (28th : 2002 : Hong Kong, China)
      Format: 
      Excerpt: 
      -Relational Databases; Database Selection Using Actual Physical and Acquired Logical Collection Resources in a Massive
      by 
      Wright, Craig.
      Format: 
      Excerpt: 
      fundamentals; Chapter 9 -- Policy Development; Chapter 10 -- Assessing Security Awareness and Knowledge of
      by 
      England, Ken, 1955-
      Format: 
      Excerpt: 
      ), XML, DDL for basic database objects such as tales, views and indexes, partitioning, and security is
      by 
      Guros, Larry.
      Format: 
      Excerpt: 
      programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in
      by 
      Powell, Gavin.
      Format: 
      Excerpt: 
      , datatypes (including collections), XML in Oracle, DDL for basic database objects such as tales, views and
      by 
      Bidgoli, Hossein.
      Format: 
      Excerpt: 
      -- Network Database Systems -- Network Environments, Managing Number Representation and Computer Arithmetic
      by 
      Sturm, Rick.
      Format: 
      Excerpt: 
      -SERVICE-LEVEL MANAGEMENT -- APPENDIX B-CONFIGURATION MANAGEMENT DATABASE -- APPENDIX C-NIST DEFINITION REPORT -- SUMMARY
      by 
      Halpin, T. A.
      Format: 
      Excerpt: 
      Security and Meta-Data -- 13.11 Concurrency -- 13.12 Summary -- 14 Schema Transformations -- 14.1 Schema