Database security
Label
Database security
Name
Database security
Focus
Actions
Incoming Resources
- Subject of9
- How to survive a data breach, a pocket guide, Stewart Mitchell
- Security de-engineering, solving the problems in information risk management, Ian Tibble
- Secure data provenance and inference control with Semantic Web, Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar
- Designing an IAM framework with Oracle Identity and access management suite, Jeff Scheidel
- The database hacker's handbook, defending database servers, David Litchfield [and others]
- Security Functions of IBM DB2 10 for z/OS, Bruni, Paolo
- Practical Oracle Security, Shaul, Josh
- Hadoop security, Ben Spivey & Joey Echeverria
- Solidity Smart Contracts, Build DApps in Ethereum Blockchain, Stoilov, Rangel
- The complete book of data anonymization, from planning to implementation, Balaji Raghunathan
- Building Ethereum Dapps, decentralized applications on the Ethereum blockchain, Roberto Infante
- Introduction to information security, LiveLessons (Sneak Peek Video Training), Scott Aurnou
- Oracle database application security, with Oracle Internet Directory, Oracle Access Manager, and Oracle Identity Manager, Osama Mustafa, Robert P. Lockard
- How to secure and audit Oracle 10g and 11g, Ron Ben Natan ; foreword by Pete Finnigan
- IBM system storage N series SnapMirror, Alex Osuna, Chrisanthy Carlane
- Ethereum for dummies, Michael G. Solomon
- The truth machine, the blockchain and the future of everything, Michael J. Casey and Paul Vigna
- Cyber security engineering, a practical approach for systems and software assurance, Nancy R. Mead, Carol C. Woody
- Applied Oracle security, developing secure database and middleware environments, David C. Knox [and others]
- Data sharing and collaboration with Delta Sharing, by Ron L'Esteve
- Database and application security, a practitioner's guide, R. Sarma Danturthi
Outgoing Resources
- Focus1