000 03898cam a2200373Ii 4500
001 9780203486061
008 180331s2005 flua ob 001 0 eng d
020 _a9780203486061
_q(e-book : PDF)
020 _a9781135489069
_q(e-book: Mobi)
020 _a9781135489106
_q(e-book: ePub)
020 _a9781135489113
_q(e-book: PDF)
020 _a9781466525450
_q(e-book)
020 _z9780849322242
_q(hardback)
024 7 _a10.1201/9780203486061
_2doi
035 _a(OCoLC)71778447
040 _aFlBoTFG
_cFlBoTFG
_erda
050 4 _aQA76.9.D314
_bT47 2005
082 0 4 _a005.8
_bT536
100 1 _aThuraisingham, Bhavani M.,
_eauthor.
_915876
245 1 0 _aDatabase and applications security :
_bintegrating information security and data management /
_cBhavani Thuraisingham.
264 1 _aBoca Raton, FL :
_bAuerbach Publications,
_c2005.
300 _a1 online resource (xxxvi, 619 pages)
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
504 _aIncludes bibliographical references (pages 593-595) and index.
505 0 0 _apart, PART I: SUPPORTING TECHNOLOGIES FOR DATABASE AND APPLICATIONS SECURITY -- chapter 1 Introduction -- chapter 2 Data Management Technologies -- chapter 3 Information Security -- chapter 4 Information Management Technologies -- chapter Conclusion to Part I -- part, PART II: DISCRETIONARY SECURITY FOR DATABASE SYSTEMS -- chapter 5 Security Policies -- chapter 6 Policy Enforcement and Related Issues -- chapter Conclusion to Part II -- part, PART III: MANDATORY SECURITY FOR DATABASE SYSTEMS -- chapter 7 Historical Developments -- chapter 8 Design Principles -- chapter Conclusion to Part III -- part, PART IV: MULTILEVEL SECURE RELATIONAL DATABASE SYSTEMS -- chapter 9 Multilevel Relational Data Models -- chapter 10 Security Impact on Database Functions -- chapter 11 Prototypes and Products -- chapter Conclusion to Part IV -- part, PART V: THE INFERENCE PROBLEM -- chapter 12 A Perspective of the Inference Problem -- chapter 13 Security-Constraint Processing for Inference Control -- chapter 14 Conceptual Structures for Inference Control -- chapter Conclusion to Part V -- part, PART VI: SECURE DISTRIBUTED AND HETEROGENEOUS DATABASE SYSTEMS -- chapter 15 Discretionary Security for Distributed Database Systems -- chapter 16 Multilevel Security for Distributed Database Systems -- chapter 17 Secure Heterogeneous and Federated Database Systems -- chapter Conclusion to Part VI -- part, PART VII: SECURE OBJECT AND MULTIMEDIA SYSTEMS -- chapter 18 Discretionary and Multilevel Security for Object Database Systems -- chapter 19 Aspects of Objects and Security -- chapter 20 Secure Multimedia Data Management Systems -- chapter Conclusion to Part VII -- part, PART VIII: DATA WAREHOUSING, DATA MINING, SECURITY, AND PRIVACY -- chapter 21 Secure Data Warehousing -- chapter 22 Data Mining for Security Applications -- chapter 23 Privacy -- chapter Conclusion to Part VIII -- part, PART IX: SECURE WEB DATA AND INFORMATION MANAGEMENT TECHNOLOGIES -- chapter 24 Secure Web Data Management and Digital Libraries -- chapter 25 Security for XML, RDF, and the Semantic Web -- chapter 26 Secure E-Commerce, Collaboration, and Knowledge Management -- chapter Conclusion to Part IX -- part, PART X: EMERGING SECURE DATA MANAGEMENT TECHNOLOGIES AND APPLICATIONS -- chapter 27 Secure Dependable Data Management -- chapter 28 Secure Sensor and Wireless Information Management -- chapter 29 Digital Identity, Forensics, and Related Topics -- chapter Conclusion to Part X -- chapter 30 Summary and Directions.
650 0 _aComputer security.
_93970
650 0 _aDatabase management.
_93157
650 0 _aDatabase security.
_911507
776 0 8 _iPrint version:
_z9780849322242
_w(DLC) 2005043625
856 4 0 _uhttps://www.taylorfrancis.com/books/9780203486061
_zClick here to view.
942 _cEBK
999 _c71125
_d71125