Service restrictions from February 12-22, 2026—more information on the University Library website

Showing 41 - 60 of 395

41

SQL Server Audit
Carter, Peter A.
Securing SQL Server ; page 35-53 ; ISBN 9781484222645 9781484222652

Book
Save to List
42

SQL Server Security Model
Carter, Peter A.
Securing SQL Server ; page 15-33 ; ISBN 9781484222645 9781484222652

Book
Save to List
43

Additional Security for an Internet Facing SQL Server and Application
Cherry, Denny
Securing SQL Server ; page 147-163 ; ISBN 9781597499477

Book
Save to List
45

6 - NonStop SQL and Database Security
In Securing HP NonStop Servers in an Open Systems World 2006:217-257

Book
Save to List
46

Introduction to SQL Server Security
How to Cheat at Securing SQL Server 2005 ; page 1-19 ; ISBN 9781597491969

Book
Save to List
47

Securing SOL Server.
Informationweek. 1/13/2003, Issue 922, p47-47. 1/9p.

DATABASES SQL PROTEGRITY Corp. MICROSOFT Corp.
Journal
Save to List
48

SQL Injection Attacks and Defense 2nd edition
Clarke, Justin ; Clarke, Justin ; Clarke, Justin ; et al.

Electronic Resource
Save to List
49

The key to locking.
Stanley, Nigel
Server Management. Apr2006, p40-42. 3p.

DATABASE management CLIENT/SERVER computing SQL COMPUTER systems INFORMATION technology
Journal
Save to List
50

Hands-On SQL Server 2019 Analysis Services
Hughes, Steven ; Jorgensen, Adam ; Hughes, Steven ; et al.

Electronic Resource
Save to List
51

Better SQL Server Backups.
McCown, Sean
InfoWorld. 10/18/2004, Vol. 26 Issue 42, p16-16. 1/3p.

SQL DATA protection ALGORITHMS COMPUTER systems IDERA (Company)
Journal
Save to List
52

Microsoft SQL Server 2012 Security Cookbook
Bruchez, Rudi ; Bruchez, Rudi ; Bruchez, Rudi ; et al.

Electronic Resource
Save to List
53

Advanced Oracle PL/SQL Developer's Guide Ed. 2
Gupta, Saurabh K. ; Gupta, Saurabh K. ; Gupta, Saurabh K. ; et al.

Electronic Resource
Save to List
54

Chapter 7 - Analysis Services
In Securing SQL Server Edition: Third Edition. 2015:213-234

Book
Save to List
55

Best Damn Windows Server 2008 Book Period
Piltzecker, Anthony ; Piltzecker, Anthony ; Piltzecker, Anthony ; et al.

Electronic Resource
Save to List
56

A detailed guide to the OWASP top 10
Detailed guide to the Open Worldwide Application Security Project top 10

Packt Publishing, publisher, production company. ; Oni, Alexander, on-screen presenter, instructor.

Video Recording
Save to List
57

APPLIED CRYPTOGRAPHY IN DESIGNING E-LEARNING PLATFORMS.
MIHAILESCU, Marius Iulian ; NITA, Stefania Loredana ; CORNELIU, Pau Valentin
eLearning & Software for Education. 2020, Vol. 2, p179-189. 11p.

Algorithms Mobile learning Cryptography Data encryption Encryption protocols Digital signatures
Conference
Save to List
58

Securing the database.
Hammond, Mark
PC Week. 08/31/98, Vol. 15 Issue 35, p3. 1/3p.

SQL COMPUTER software DATABASE security softwa... DBSECURE Inc. BRAINTREE Security Softw...
Journal
Save to List
59

Securing web applications from SQLIA using progressive detector
N. Gunaseeli ; D. Jeya Mala
Inderscience Enterprises Ltd, International Journal of Information Systems and Change Management. 9(1):44-69

Academic journal
Save to List
60

ENHANCING THE SECURITY LEVEL OF THE NEW VERSION OF THE EASY-LEARNING ONLINE PLATFORM.
RĂDESCU, Radu ; PAŞCA, Sever
eLearning & Software for Education. 2017, Vol. 2, p158-163. 6p.

Mobile learning Virtual classrooms Courseware Distance education Online education
Conference
Save to List

Filter