Serviceeinschränkungen vom 12.-22.02.2026 - weitere Infos auf der UB-Homepage

Treffer 81 - 100 von 388

81

Essential Resources for DBAs.
Campbell, Michael K.
SQL Server Magazine; Jul2011, Vol. 13 Issue 7, p37-37, 2/3p

DATABASE administration SQL DATABASE management ONLINE social networks INTERNET forums
Zeitschrift
Zu den Favoriten
82

Server Rights
Cherry, Denny
Securing SQL Server ; page 357-389 ; ISBN 9780128012758

Buch
Zu den Favoriten
83

Server Rights
Cherry, Denny
Securing SQL Server ; page 311-341 ; ISBN 9781597499477

Buch
Zu den Favoriten
84

Securing Your SQL Server Environment.
Sheldon, William
SQL Server Magazine; Nov2009, Vol. 11 Issue 11, p18-22, 4p, 1 Color Photograph, 1 Diagram

SQL DATABASE administration CLIENT/SERVER computing DATABASE management COMPUTER security COMPUTER operating syste...
Zeitschrift
Zu den Favoriten
85

WEB Q & A.
Michell, Nancy
MSDN (1528-4859). Mar2004, Vol. 19 Issue 3, p17-20. 4p.

Computers Computer software Computer industry
Zeitschrift
Zu den Favoriten
86

The Essential Guide to Optimizing, Scaling and Securing Microsoft SQL Server 2012.
Otey, Michael
SQL Server Pro; Jun2012, Vol. 14 Issue 6, p53-67, 15p, 1 Color Photograph, 4 Diagrams, 1 Graph

SQL ELECTRONIC information r... DATABASE management COMPUTER software SOFTWARE configuration m...
Zeitschrift
Zu den Favoriten
87

WASM -- A Metric for Securing a Web Application.
Kumar, Rakesh ; Kaur, Gurvinder
Journal of Research & Practice in Information Technology. Feb2014, Vol. 46 Issue 1, p19-29. 11p.

Website security Web-based user interface... Computer network securit... Systems design Computer hacking
Fachzeitschrift
Zu den Favoriten
88

Securing Credit Card Data Through SQL Server 2008: Take advantage of SQL Server features that can help your organization achieve PCI DSS compliance.
DeJesus, Edmund X.
SQL Server Magazine; Dec2010, Vol. 12 Issue 12, p41-45, 5p, 1 Chart

UNITED States AMERICAN Express Co. DISCOVER Financial Servi... MASTERCARD International... CREDIT cards DATA protection
Zeitschrift
Zu den Favoriten
89

Securing System i Access for Web.
Beckman, Mel
System iNEWS. Jun2009, Issue 356, p35-38. 4p. 1 Color Photograph, 1 Diagram, 2 Charts, 1 Map.

International Business M... Databases SQL Programming languages Electronic data processi...
Zeitschrift
Zu den Favoriten
90

SECURING MS-SQL INTERNET APPLICATIONS THAT USE XML: PART 2.
Nelson, Karen
EDP Auditing; Dec2002, p1, 14p

Zeitschrift
Zu den Favoriten
91

SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
Bashah Mat Ali, Abdul ; Yaseen Ibrahim Shakhatreh, Ala’ ; Syazwan Abdullah, Mohd ; et al.
Procedia Computer Science. Jun2011, Vol. 3, p453-458. 6p.

SQL Scanning systems Automatic control system... Web services Cyberterrorism Information technology s...
Fachzeitschrift
Zu den Favoriten
92

SECURING MS-SQL INTERNET APPLICATIONS THAT USE XML: PART 1.
Nelson, Karen
EDP Auditing; Dec2002, p1, 9p

Zeitschrift
Zu den Favoriten
93

ACCESS SECURE to Report Data. (cover story)
de Clercq, Jan
SQL Server Magazine; Jun2007, Vol. 9 Issue 6, p35-37, 3p, 3 Illustrations

SQL COMPUTER security SECURITY systems DATA protection GOVERNMENT regulation
Zeitschrift
Zu den Favoriten
94

The Case of the Wicked Wrist Rapper.
B.I. Powers
SQL Server Magazine; Aug2006, Vol. 8 Issue 8, p49-50, 2p

COMPUTER security DATABASES COMPUTER users SQL INFORMATION storage & re...
Zeitschrift
Zu den Favoriten
95

Secure Distributed MapReduce Protocols : How to have privacy-preserving cloud applications?
Protocoles distribués et sécurisés pour le paradigme MapReduce : Comment avoir des applications dans les nuages respectueuses de la vie privée ?

Giraud, Matthieu ; Laboratoire d'Informatique, de Modélisation et d'Optimisation des Systèmes (LIMOS) ; Ecole Nationale Supérieure des Mines de St Etienne (ENSM ST-ETIENNE)-Université Clermont Auvergne [2017-2020] (UCA [2017-2020])-Centre National de la Recherche Scientifique (CNRS) ; et al.
Cryptography and Security [cs.CR]. Université Clermont Auvergne [2017-2020], 2019. English. ⟨NNT : 2019CLFAC033⟩

Confidentiality Security MapReduce Cloud computing Big Data Sécurité
Dissertation
Zu den Favoriten
96

SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud.
Singh, Niharika ; Singh, Ashutosh Kumar
Pertanika Journal of Science & Technology; Jan2019, Vol. 27 Issue 1, p159-174, 16p

CLOUD storage CLOUD computing WIRELESS sensor nodes SQL DATA security
Fachzeitschrift
Zu den Favoriten
97

Log Visualization of Intrusion and Prevention Reverse Proxy Server against Web Attacks.
Mantoro, Teddy ; Aziz, Normaziah binti Abdul ; Yusoff, Nur Dalilah binti Meor ; et al.
2013 International Conference on Informatics & Creative Multimedia; 2013, p325-329, 5p

Konferenz
Zu den Favoriten
98

Secure Online Medicine Delivery System.
Bhat, Mohammad Waqar ; Thippeswamy, Veerabhadrappa Sondekere ; Bhushan, Himanshu ; et al.
Review of Computer Engineering Studies; Sep2020, Vol. 7 Issue 3, p74-78, 5p

INTERNET pharmacies DRUG delivery systems DATABASES DATA encryption ELECTRONIC commerce
Fachzeitschrift
Zu den Favoriten
99

Automated multilevel defence model to investigate packets for web interface.
Verma, Seema ; Singh, Tanya
2012 Ninth International Conference on Wireless & Optical Communications Networks (WOCN); 1/ 1/2012, p1-6, 6p

Konferenz
Zu den Favoriten
100

MAKING RADIUS EASY AS PI.
Robinson, Frank
Network Computing. 5/27/2004, Vol. 15 Issue 10, p77-87. 7p. 1 Color Photograph, 2 Charts.

LUCENT Technologies (Com... FUNK Software Inc. INTERLINK Networks Inc. COMPUTER systems RADIUS (Computer network... WIRELESS LANs
Zeitschrift
Zu den Favoriten

Filter