The Leading eBooks Store Online

for Kindle Fire, Apple, Android, Nook, Kobo, PC, Mac, Sony Reader...

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Database security

Most popular at the top

  • Mastering SQL Server 2000 Securityby Mike Young; Curtis W. Young

    Wiley 2003; US$ 50.00

    Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a primary concern in all aspects of development and IT administration. While locking down networks and erecting firewalls will always be necessary, so much more can be done to protect a corporation's most valuable... more...

  • Database and Applications Securityby Bhavani Thuraisingham

    Taylor and Francis 2005; US$ 104.95

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections,... more...

  • Understanding DB2 9 Securityby Rebecca Bond; Kevin Yeung-Kuen See; Carmen Ka Man Wong; Yuk-Kuen Henry Chan

    Pearson Education 2006; US$ 39.99

    Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation... more...

  • How to Survive a Data Breachby Stewart Mitchell

    IT Governance Publishing 2009; US$ 14.95

    This is the downloadable version of this new pocket guide which provides essential support for organisations who would like to have a tried and tested procedure in place for dealing with data breaches. more...

  • The Oracle Hacker's Handbookby David Litchfield

    Wiley 2007; US$ 44.99

    David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it... more...

  • CryptoGraphicsby Debra Cook; Angelos Keromytis

    Springer-Verlag New York Inc 2006; US$ 169.00

    Explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. This work evaluates the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in GPUs. more...

  • Pro SQL Server 2005 Assembliesby Robin Dewson; Julian Skinner

    Springer 2006; US$ 34.99

    he book is an invaluable guide and tutorial to using the different types of assemblies in SQL Server 2005. Examples are plentiful and well chosen to represent common business solutions. — Will Wagers, C# Online.NET "Pro SQL Server 2005 Assemblies" provides a detailed and example-driven tutorial on how to build and use .NET assemblies.... more...

  • Handbook of Database Securityby Michael Gertz; Sushil Jajodia

    Springer 2007; US$ 229.00

    Provides an overview of data security models, techniques, and architectures for a variety of data management applications and settings. This book emphasizes aspects of data centric security that reach beyond traditional and known approaches. It covers SQL standards and security in commercial and open-source database management systems. more...

  • Practical Oracle Securityby Josh Shaul; Aaron Ingram

    Elsevier Science 2011; US$ 51.95

    This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database. The book?s companion Web site... more...

  • InfoSecurity 2008 Threat Analysisby Craig Schiller; Seth Fogie; Colby DeRodeff; Michael Gregg

    Elsevier Science 2011; US$ 62.95

    An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities,... more...