The Leading eBooks Store Online

3,572,933 members ⚫ 1,183,089 ebooks

New to eBooks.com?

Learn more
Browse our categories
  • Bestsellers - This Week
  • Foreign Language Study
  • Pets
  • Bestsellers - Last 6 months
  • Games
  • Philosophy
  • Archaeology
  • Gardening
  • Photography
  • Architecture
  • Graphic Books
  • Poetry
  • Art
  • Health & Fitness
  • Political Science
  • Biography & Autobiography
  • History
  • Psychology & Psychiatry
  • Body Mind & Spirit
  • House & Home
  • Reference
  • Business & Economics
  • Humor
  • Religion
  • Children's & Young Adult Fiction
  • Juvenile Nonfiction
  • Romance
  • Computers
  • Language Arts & Disciplines
  • Science
  • Crafts & Hobbies
  • Law
  • Science Fiction
  • Current Events
  • Literary Collections
  • Self-Help
  • Drama
  • Literary Criticism
  • Sex
  • Education
  • Literary Fiction
  • Social Science
  • The Environment
  • Mathematics
  • Sports & Recreation
  • Family & Relationships
  • Media
  • Study Aids
  • Fantasy
  • Medical
  • Technology
  • Fiction
  • Music
  • Transportation
  • Folklore & Mythology
  • Nature
  • Travel
  • Food and Wine
  • Performing Arts
  • True Crime
  • Foreign Language Books
Database security

Most popular at the top

  • Mastering SQL Server 2000 Securityby Mike Young; Curtis W. Young

    Wiley 2003; US$ 50.00 US$ 35.00

    Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a primary concern in all aspects of development and IT administration. While locking down networks and erecting firewalls will always be necessary, so much more can be done to protect a corporation's most valuable... more...

  • Understanding DB2 9 Securityby Rebecca Bond; Kevin Yeung-Kuen See; Carmen Ka Man Wong; Yuk-Kuen Henry Chan

    Pearson Education 2006; US$ 39.99

    Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world implementation... more...

  • How to Survive a Data Breachby Stewart Mitchell

    IT Governance Ltd 2009; US$ 29.90

    A data breach can be a crushing blow to customer and staff confidence in your organisation. It can also seriously damage your reputation and brand value, and the career prospects of the staff involved. This pocket guide provides a loose blueprint to ensure that you know what steps you must take to rectify the situation, which authorities you need... more...

  • The Oracle Hacker's Handbookby David Litchfield

    Wiley 2007; US$ 44.99 US$ 26.99

    David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it... more...

  • Practical Oracle Securityby Josh Shaul; Aaron Ingram

    Elsevier Science 2011; US$ 51.95

    This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database. The book?s companion Web site... more...

  • InfoSecurity 2008 Threat Analysisby Craig Schiller; Seth Fogie; Colby DeRodeff; Michael Gregg

    Elsevier Science 2011; US$ 62.95

    An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities,... more...

  • Modelling Cyber Securityby U. Gori

    IOS Press 2009; US$ 157.00

    Cyberterrorism and cybercrime are on the rise. The normal computer user also has to fight against the 'scareware' or fake antivirus software websites and the ubiquitous spam. This book identifies the measures to be taken in order to minimize the strategic and economic impact of cyber attacks. It is suitable for engineers working on IT security. more...

  • Privacy-Preserving Data Publishingby Raymond Chi-Wing Wong; Ada Wai-Chee Fu

    Morgan & Claypool Publishers 2010; US$ 35.00

    Privacy preservation has become a major issue in many data analysis applications. When a data set is released to other parties for data analysis, privacy-preserving techniques are often required to reduce the possibility of identifying sensitive information about individuals. For example, in medical data, sensitive information can be the fact that... more...

  • Query Answer Authenticationby HweeHwa Pang; Tan Kian-Lee

    Morgan & Claypool Publishers 2012; US$ 40.00

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers.This book introduces various notions... more...

  • Enhancing Information Security and Privacy by Combining Biometrics with Cryptographyby Sanjay Kanade; Dijana Petrovska-Delacretaz; Bernadette Dorizzi

    Morgan & Claypool Publishers 2012; US$ 40.00

    This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity.... more...