Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Language
Subject
Library
62 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Forst, Brian.
      Format: 
      Excerpt: 
      and local coordination in homeland security Ed Maguire and William King; 15. Liberty and security in
      by 
      Noergaard, Tammy.
      Format: 
      Excerpt: 
      Together : Complex Messaging, Communication and Security -- The Holistic View to Demystifying Middleware.
      by 
      Saltzer, J. H., 1939-
      Format: 
      Excerpt: 
      languages, software engineering, security, fault tolerance, and architecture. Through carefully analyzed
      by 
      Walther, Henrik.
      Format: 
      Excerpt: 
      improved database portability feature to port and recover a Mailbox database to any server in the Exchange
      by 
      Babbin, Jacob.
      Format: 
      Excerpt: 
      , intrusion detection system, mail server, Web server, and database produces some type of log file. This is
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      ! -- Document grinding and database digging -- Protecting yourself from Google hackers -- Automating Google
      by 
      Melton, Jim, 1946-
      Format: 
      Excerpt: 
      , users, and security -- Transaction management -- Connections and remote database access -- Routines and
      by 
      Speegle, Gregory D. (Gregory David)
      Format: 
      Excerpt: 
      procedures, updating the database, storing metadata, carrying out transactions, working with binary large
      by 
      Sills, Adam.
      Format: 
      Excerpt: 
      XML -- Using XML in the .NET framework -- Understanding .NET and XML security -- Web development using
      by 
      IFIP WG2.6 Database Semantics Conference on Interoperable Database Systems (DS-5) (1992 : Lorne, Vic.)
      Format: 
      Excerpt: 
      interoperable database systems. Topics covered include techniques to support the translation between database
      by 
      Yovits, M. C. (Marshall Clinton)
      Format: 
      Excerpt: 
      -to-Specification Correspondence; 4. The Bell-LaPadula Model; 5. Database and Network Models; 6. Information Flow Models; 7
      by 
      Padilla, George Gregory, author.
      Format: 
      Excerpt: 
      were not available to their communities, and that only 53 (62.4%) offered presentations regarding cyber-security