Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
| Main Authors: | Jonker, Willem 1962- (Author), Petkovic, Milan (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Berlin ; New York
Springer
c2007
|
| Series: | Lecture notes in computer science
4721 |
| Subjects: |
Similar Items
Data management data, data everywhere ; 24th British National Conference on Databases, BNCOD 24, Glasgow, UK, July 3-5, 2007 : proceedings
by: Cooper, Richard 1946-, et al.
Published: (2007)
by: Cooper, Richard 1946-, et al.
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Microsoft access 2007 data analysis
by: Alexander, Michael 1972-
Published: (2007)
by: Alexander, Michael 1972-
Published: (2007)
Access 2007 bible
by: Groh, Michael R. 1951-
Published: (2007)
by: Groh, Michael R. 1951-
Published: (2007)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Advances in databases and information systems 11th East European conference, ADBIS 2007, Varna, Bulgaria, September 29-October 3, 2007 : proceedings
by: Ioannidis, Yannis, et al.
Published: (2007)
by: Ioannidis, Yannis, et al.
Published: (2007)
Access 2000 through examples
by: Sellappan, P.
Published: (1999)
by: Sellappan, P.
Published: (1999)
Database design, development and deployment using Microsoft Access
by: Rob, Peter, et al.
Published: (2000)
by: Rob, Peter, et al.
Published: (2000)
Access 97 power programming
by: Barker, F. Scott
Published: (1997)
by: Barker, F. Scott
Published: (1997)
Creating Access applications
by: Dunn, Melissa W.
Published: (1994)
by: Dunn, Melissa W.
Published: (1994)
Databases and information systems IV selected papers from the Seventh International Baltic Conference, DB&IS'2006
by: Caplinskas, Albertas, et al.
Published: (2007)
by: Caplinskas, Albertas, et al.
Published: (2007)
Computer security
Published: (1986)
Published: (1986)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Algorithms and data structures 10th international workshop, WADS 2007, Halifax, Canada, August 15-17, 2007 proceedings
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
by: Dehne, F. (Frank) 1960-, et al.
Published: (2007)
Information security and privacy 12th Australasian conference, ACISP 2007, Townsville, Australia, July 2-4, 2007 proceedings
by: Dawson, Ed (Edward), et al.
Published: (2007)
by: Dawson, Ed (Edward), et al.
Published: (2007)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Information organization and databases : foundations of data organization
by: Ghandeharizadeh, Shahram, et al.
Published: (2000)
by: Ghandeharizadeh, Shahram, et al.
Published: (2000)
Information and communications security 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 proceedings
by: Imai, Hideki 1943-, et al.
Published: (2007)
by: Imai, Hideki 1943-, et al.
Published: (2007)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Advanced data mining and applications third international conference, ADMA 2007, Harbin, China, August 6-8, 2007 : proceedings
by: Alhajj, Reda
Published: (2007)
by: Alhajj, Reda
Published: (2007)
Access 2003 power programming with VBA
by: Taylor, Allen G., et al.
Published: (2004)
by: Taylor, Allen G., et al.
Published: (2004)
Multiagent system technologies 5th German conference, MATES 2007, Leipzig, Germany, September 24-26, 2007 proceedings
by: Petta, Paolo 1963-
Published: (2007)
by: Petta, Paolo 1963-
Published: (2007)
Advances in data mining theoretical aspects and applications 7th industrial conference, ICDM 2007, Leipzig, Germany, July 14-18, 2007 proceedings
by: Perner, Petra
Published: (2007)
by: Perner, Petra
Published: (2007)
E-commerce and web technologies 8th international conference, EC-Web 2007, Regensburg, Germany, September 3-7, 2007 proceedings
by: Psaila, Giuseppe, et al.
Published: (2007)
by: Psaila, Giuseppe, et al.
Published: (2007)
Software architecture : first European conference, ECSA 2007, Madrid, Spain, September 24-26, 2007 : proceedings
by: Oquendo, Flavio , 1958-
Published: (2007)
by: Oquendo, Flavio , 1958-
Published: (2007)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Proceedings of the International Livestock-Tree Cropping Workshop
by: Zainuddin, Ahmad Tajuddin B.
Published: (1991)
by: Zainuddin, Ahmad Tajuddin B.
Published: (1991)
Go! with Microsoft Office Access 2003 comprehensive
by: Foster-Turpen, Linda, et al.
Published: (2004)
by: Foster-Turpen, Linda, et al.
Published: (2004)
Future of the nuclear security environment in 2015 proceedings of a Russian-US workshop
by: Gottemoeller, Rose E. (Rose Eilene) 1953-, et al.
Published: (2009)
by: Gottemoeller, Rose E. (Rose Eilene) 1953-, et al.
Published: (2009)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Multimedia content analysis and mining international workshop, MCAM 2007, Weihai, China, June 30-July 1, 2007 proceedings
by: Sebe, Nicu
Published: (2007)
by: Sebe, Nicu
Published: (2007)
Regulation of feed intake proceedings of the 5th Zodiac Symposium 22-24 April 1998, Wageningen, The Netherlands
by: Heide, D. van der (Daan)
Published: (1999)
by: Heide, D. van der (Daan)
Published: (1999)
Property and security selected essays
by: Bennett Moses, Lyria, et al.
Published: (2010)
by: Bennett Moses, Lyria, et al.
Published: (2010)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Recent advances in mycoplasmology proceedings of the 7th Congress of the International Organization for Mycoplasmology, Baden near Vienna, 1988
by: Stanek, Gerold
Published: (1990)
by: Stanek, Gerold
Published: (1990)
Information Security in Educational Institutions : proceedings and programme of MyEduSec Seminar 2007 held on 28-29 May 2007 in Kuala Terengganu, Terengganu
Published: (2007)
Published: (2007)
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007)
by: Galbraith, Steven D.
Published: (2007)
Data warehouse : from architecture to implementation
by: Devlin, Barry
Published: (1997)
by: Devlin, Barry
Published: (1997)
Similar Items
-
Data management data, data everywhere ; 24th British National Conference on Databases, BNCOD 24, Glasgow, UK, July 3-5, 2007 : proceedings
by: Cooper, Richard 1946-, et al.
Published: (2007) -
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007) -
Microsoft access 2007 data analysis
by: Alexander, Michael 1972-
Published: (2007) -
Access 2007 bible
by: Groh, Michael R. 1951-
Published: (2007) -
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)