Database and database application security
暂无分享,去创建一个
[1] Brian McKenna. IBM and Cisco step up security convergence , 2004 .
[2] Meg Murray,et al. Using animation courseware in the teaching of database security , 2007, SIGITE '07.
[3] Kwan-Liu Ma. Cyber security through visualization , 2006, APVIS.
[4] Ratna Bearavolu,et al. Closing-the-loop: discovery and search in security visualizations , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[5] John Heasman,et al. The Database Hacker's Handbook: Defending Database Servers , 2005 .
[6] Ron Ben Natan. Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase , 2005 .
[7] Wayne G. Lutters,et al. A user-centered approach to visualizing network traffic for intrusion detection , 2005, CHI Extended Abstracts.
[8] David Knox. Effective Oracle Database 10g Security by Design , 2004 .
[9] Ron Ben-Natan. Implementing database security and auditing : a guide for DBAs, information security administrators and auditors , 2005 .