Sold Out
Book Categories |
Opening session. Federated and replicated databases. Object -oriented systems. Mandatory access control. Concurrency control. Design and implementation of access controls. Role based access control and next generation security models. Inference detection. Secure commercial database systems. Storage jamming and wrap-up. Informal evening session:data mining.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionDatabase Security IX, Vol. 9
X
This Item is in Your InventoryDatabase Security IX, Vol. 9
X
You must be logged in to review the productsX
X
X
Add Database Security IX, Vol. 9, This book documents progress and presents a broad perspective of recent developments in database security. It also discusses in depth the current state-of-the-art in research in the field. A number of topics are explored in detail including: current resee, Database Security IX, Vol. 9 to the inventory that you are selling on WonderClubX
X
Add Database Security IX, Vol. 9, This book documents progress and presents a broad perspective of recent developments in database security. It also discusses in depth the current state-of-the-art in research in the field. A number of topics are explored in detail including: current resee, Database Security IX, Vol. 9 to your collection on WonderClub |