Showing 1 - 20 results of 53 for search '', query time: 0.08s Refine Results
  1. 1

    Understanding DB2 9 security

    Upper Saddle River, N.J. : IBM Press, 2006
    Format: Electronic eBook
    Full text (Wentworth users only)
  2. 2
  3. 3

    Big data analytics in cybersecurity and IT management by Savas, Onur, Deng, Julia

    Boca Raton : CRC Press, 2017
    Format: Electronic eBook
    Full text (WIT users only)
  4. 4

    IBM Tivoli storage resource manager a practical introduction

    [S.l.] : IBM, International Technical Support Organization, 2003
    2nd ed.
    Format: Electronic eBook
    Access E-Book
  5. 5

    IT-Sicherheit : Eine Einführung by Hellmann, Roland

    Berlin ; Boston : De Gruyter Oldenbourg, 2018
    Format: Electronic eBook
    Access E-Book
  6. 6

    Check Point NG next generation security administration by Simonis, Drew

    Rockland, Mass. : Syngress Publishing, Inc., 2002
    Format: Electronic eBook
    Access E-Book
    Access E-Book.
  7. 7

    SQL injection defenses by Nystrom, Marty

    Sebastopol, Calif. : O'Reilly, 2007
    Format: Electronic eBook
    Full text (Wentworth users only)
  8. 8
  9. 9

    The truth machine : the blockchain and the future of everything by Casey, Michael, 1967-, Vigna, Paul

    New York : St. Martin's Press, 2018
    First edition.
    Format: Book


  10. 10
  11. 11

    Database and applications security integrating information security and data management by Thuraisingham, Bhavani M.

    Boca Raton, FL : Auerbach Publications, 2005
    Format: Electronic eBook
    Full text (WIT users only)
  12. 12

    Z/OS identity propagation

    [Poughkeepsie, N.Y.] : IBM, International Technical Support Organization, 2011
    Format: Electronic eBook
    Full text (Wentworth users only)
  13. 13
  14. 14

    HANDBOOK OF SHARING CONFIDENTIAL DATA differential privacy, secure multiparty computation, and synthetic data

    [S.l.] : CHAPMAN & HALL CRC, 2024
    Format: Electronic eBook
    Full text (Wentworth users only)
  15. 15

    Protecting Oracle Database 12c : removing the risk from database consolidation by Wright, Paul

    New York, New York : Apress, 2014
    Format: Electronic eBook
    Full text (Wentworth users only)
  16. 16
  17. 17

    Examining Facebook and the case for privacy.

    [Place of publication not identified] : Big Think, 2019
    Format: Electronic Video
    Full text (Emerson users only)
    Full text (Emmanuel users only)
    Full text (MCPHS users only)
    Full text (Wentworth users only)
  18. 18
  19. 19

    Security de-engineering solving the problems in information risk management by Tibble, Ian

    Boca Raton : CRC Press, 2011
    Format: Electronic eBook
    Full text (WIT users only)
  20. 20

    How to survive a data breach : a pocket guide by Mitchell, Stewart

    Ely, U.K. : IT Governance Pub., 2009
    Format: Electronic eBook
    Full text (Wentworth users only)