Cryptography in the database the last line of defense
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
Upper Saddle River, NJ
Addison Wesley
2006
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-348803 | ||
020 | # | # | |a 0321320735 |
090 | 0 | 0 | |a QA76.9.D314 |b K45 2006 |
100 | 1 | # | |a Kenan, Kevin |
245 | 1 | 1 | |a Cryptography in the database |b the last line of defense |c Kevin Kenan |
260 | # | # | |a Upper Saddle River, NJ |b Addison Wesley |c 2006 |
300 | # | # | |a xxii, 277 p. |b ill. |c 24 cm |
504 | # | # | |a Includes bibliographical references (p. 255-256) and index |
650 | # | 0 | |a Cryptography |
650 | # | 0 | |a Database security |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=348803 |
964 | # | # | |c BOK |d 01 |
040 | # | # | |a Shah Alam |
998 | # | # | |a 00260##a003.5.1||00260##b003.5.1||00260##c003.5.1||00300##a003.5.1||00300##b003.5.1||00300##c003.5.1|| |