Search Results for - Narrowed by: Database management. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Database$002bmanagement.$002509Database$002bmanagement.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-14T13:32:17Z Dynamic SQL : applications, performance, and security in Microsoft SQL server ent://SD_ILS/0/SD_ILS:2318295 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar">https://go.oreilly.com/library-access/library/view/-/9781484243183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243183/?ar">https://learning.oreilly.com/library/view/~/9781484243183/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484243183">https://learning.oreilly.com/library/view/~/9781484243183</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085134 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Belhajjame, Khalid. editor. (orcid)0000-0001-6938-0820<br/><a href="https://doi.org/10.1007/978-3-319-98379-0">https://doi.org/10.1007/978-3-319-98379-0</a><br/>Format:&#160;Electronic Resources<br/> Data Management Technologies and Applications 6th International Conference, DATA 2017, Madrid, Spain, July 24&ndash;26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084881 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94809-6">https://doi.org/10.1007/978-3-319-94809-6</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : design a security framework for an Internet connected ecosystem ent://SD_ILS/0/SD_ILS:2318628 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625821/?ar">https://learning.oreilly.com/library/view/~/9781788625821/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625821/?ar</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085675 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Li, Wenfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45940-0">https://doi.org/10.1007/978-3-319-45940-0</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086209 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085561 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format:&#160;Electronic Resources<br/> Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086151 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085218 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Bj&oslash;rner, Nikolaj. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28034-9">https://doi.org/10.1007/978-3-319-28034-9</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014 ent://SD_ILS/0/SD_ILS:2085810 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49175-1">https://doi.org/10.1007/978-3-662-49175-1</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Third International Conference, FDSE 2016, Can Tho City, Vietnam, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086066 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48057-2">https://doi.org/10.1007/978-3-319-48057-2</a><br/>Format:&#160;Electronic Resources<br/> Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedings ent://SD_ILS/0/SD_ILS:2084639 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Guo, Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28910-6">https://doi.org/10.1007/978-3-319-28910-6</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2311027 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Russell, Brian, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781785889639">https://learning.oreilly.com/library/view/~/9781785889639</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar">https://go.oreilly.com/library-access/library/view/-/9781785889639/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781785889639/?ar">https://learning.oreilly.com/library/view/~/9781785889639/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dynamic SQL : applications, performance, and security : rapid response and flexibility in the face of changing business requirements ent://SD_ILS/0/SD_ILS:2310671 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Pollack, Edward, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484218112/?ar">https://go.oreilly.com/library-access/library/view/-/9781484218112/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484218112/?ar">https://learning.oreilly.com/library/view/~/9781484218112/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical internet of things security : a practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world ent://SD_ILS/0/SD_ILS:2271720 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Russell, Brian, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4594308">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:409830 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Raghunathan, Balaji, author.<br/>Format:&#160;Books<br/> Oracle 11g Anti-hacker's Cookbook. ent://SD_ILS/0/SD_ILS:2296554 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Neagu, Adrian.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar">https://go.oreilly.com/library-access/library/view/-/9781849685269/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685269/?ar">https://learning.oreilly.com/library/view/~/9781849685269/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849685269">https://learning.oreilly.com/library/view/~/9781849685269</a><br/>Format:&#160;Electronic Resources<br/> Set Up Security and Integration with the DataPower XI50z for zEnterprise ent://SD_ILS/0/SD_ILS:2323901 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;Credle, Rufus, author.<br/><a href="https://learning.oreilly.com/library/view/~/0738436348/?ar">https://learning.oreilly.com/library/view/~/0738436348/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738436348">https://learning.oreilly.com/library/view/~/0738436348</a> <a href="https://go.oreilly.com/library-access/library/view/-/0738436348/?ar">https://go.oreilly.com/library-access/library/view/-/0738436348/?ar</a><br/>Format:&#160;Electronic Resources<br/> Deployment guides series. IBM Tivoli Compliance Insight Manager ent://SD_ILS/0/SD_ILS:2294667 2024-06-14T13:32:17Z 2024-06-14T13:32:17Z by&#160;B&uuml;cker, Axel.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0738485705/?ar">https://go.oreilly.com/library-access/library/view/-/0738485705/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0738485705/?ar">https://learning.oreilly.com/library/view/~/0738485705/?ar</a><br/>Format:&#160;Electronic Resources<br/>