-
1
Understanding DB2 9 security
Upper Saddle River, N.J. : IBM Press, 2006Format: Electronic eBookFull text (Wentworth users only)
-
2
Multilevel Security for Relational Databases
Auerbach Publications, 2014
1st.Format: Electronic eBookFull text (Wentworth users only)
-
3
Big data analytics in cybersecurity and IT management
Boca Raton : CRC Press, 2017Format: Electronic eBookFull text (WIT users only)
-
4
IBM Tivoli storage resource manager a practical introduction
[S.l.] : IBM, International Technical Support Organization, 2003
2nd ed.Format: Electronic eBookAccess E-Book
-
5
IT-Sicherheit : Eine Einführung
Berlin ; Boston : De Gruyter Oldenbourg, 2018Format: Electronic eBookAccess E-Book
-
6
Check Point NG next generation security administration
Rockland, Mass. : Syngress Publishing, Inc., 2002Format: Electronic eBookAccess E-Book
Access E-Book.
-
7
SQL injection defenses
Sebastopol, Calif. : O'Reilly, 2007Format: Electronic eBookFull text (Wentworth users only)
-
8
Metamorfosis del estado maremoto digital y ciberseguridad.
[S.l.] : MARCIAL PONS, EDICIONES J, 2022Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
9
The truth machine : the blockchain and the future of everything
New York : St. Martin's Press, 2018
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
10
Oracle Database 12c Security Cookbook.
Packt Publishing, 2016
1.Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
Full text (Wentworth users only)
-
11
Database and applications security integrating information security and data management
Boca Raton, FL : Auerbach Publications, 2005Format: Electronic eBookFull text (WIT users only)
-
12
Z/OS identity propagation
[Poughkeepsie, N.Y.] : IBM, International Technical Support Organization, 2011Format: Electronic eBookFull text (Wentworth users only)
-
13
Safeguarding critical e-documents : implementing a program for securing confidential information assets
Hoboken, New Jersey : John Wiley & Sons, Inc., 2012Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Access E-Book.
Full text (Wentworth users only)
Full text (Wentworth users only)
-
14
HANDBOOK OF SHARING CONFIDENTIAL DATA differential privacy, secure multiparty computation, and synthetic data
[S.l.] : CHAPMAN & HALL CRC, 2024Format: Electronic eBookFull text (Wentworth users only)
-
15
Protecting Oracle Database 12c : removing the risk from database consolidation
New York, New York : Apress, 2014Format: Electronic eBookFull text (Wentworth users only)
-
16
Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Birmingham, UK : Packt Publishing, 2018Format: Electronic eBookFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (NECO users only)
Full text (MCPHS users only)
Access E-Book
Full text (Wentworth users only)
Full text (Wentworth users only)
-
17
Examining Facebook and the case for privacy.
[Place of publication not identified] : Big Think, 2019Format: Electronic VideoFull text (Emerson users only)
Full text (Emmanuel users only)
Full text (MCPHS users only)
Full text (Wentworth users only)
-
18
Oracle Identity and Access Manager 11g for administrators administer Oracle Identity and Access Management: installation, configuration, and day-to-day tasks
Birmingham, U.K. : Packt Pub., 2011Format: Electronic eBookAccess E-Book
-
19
Security de-engineering solving the problems in information risk management
Boca Raton : CRC Press, 2011Format: Electronic eBookFull text (WIT users only)
-
20
How to survive a data breach : a pocket guide
Ely, U.K. : IT Governance Pub., 2009Format: Electronic eBookFull text (Wentworth users only)