Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Information Systems (H) > Database Management (H.2) > Database Administration (H.2.7) > Security, Integrity, And Protection (H.2.7...)  
  1-10 of 38 Reviews about "Security, Integrity, And Protection (H.2.7...)": Date Reviewed
  Principles of secure processor architecture design
Szefer J., Morgan&Claypool Publishers, San Rafael, CA, 2018. 173 pp.  Type: Book (978-1-681730-01-1)

The growing use of processors where multiple applications are executed concurrently, as in cloud computing, has increased the need for security features that can protect these applications from mutual interference. Additionally, a succ...

Jun 25 2021
  Privacy in mobile and pervasive computing
Langheinrich M., Schaub F., Morgan&Claypool Publishers, San Rafael, CA, 2019. 127 pp.  Type: Book (978-1-681731-17-9)

Mobile and pervasive computing can offer really valuable benefits, such as making our lives more convenient, efficient, and safe. This is done through tailored and context-aware services that anticipate what we need, as well as where a...

Sep 23 2020
  The perfect weapon: war, sabotage, and fear in the cyber age
Sanger D., Crown Publishing Group, New York, NY, 2018. 384 pp.  Type: Book (978-0-451497-89-5)

A thriller-type story, albeit one that happens in the real world, this book is about those parts of the Internet filled with people trying to exploit it--all you need is a computer and Internet access. Just the fact that any r...

Jun 18 2020
  Securing SQL Server: protecting your database from attackers (3rd ed.)
Cherry D., Syngress Publishing, Waltham, MA, 2015. 462 pp.  Type: Book (978-0-128012-75-8)

Securing data is one of the main components of the Internet. The need for data security represents one of the most important strengths of an organization, because many organizations would not have any value without data security. This ...

Dec 11 2015
  CoBAn: a context based model for data leakage prevention
Katz G., Elovici Y., Shapira B. Information Sciences 262137-158, 2014.  Type: Article

The potential disclosure of confidential information, such as financial or customer data, to unauthorized entities is a major information security concern. The purpose of data leakage prevention (DLP) software (also known as data loss ...

Mar 25 2014
  Intelligent systems for security informatics
Yang C., Mao W., Zheng X., Wang H., ACADEMIC PRESS, Amsterdam, the Netherlands, 2013. 250 pp.  Type: Book (978-0-124047-02-0)

Intelligence and security informatics (ISI) is an active area of research of international importance. Sample research topics in this domain include crime data mining and management, informatics related to terrorism, analysis of crimin...

Feb 6 2014
  Expert Oracle Application Express security
Spendolini S., Apress, Berkeley, CA, 2013. 296 pp.  Type: Book (978-1-430247-31-9)

Web applications are becoming increasingly important for conducting business over the Internet, yet the Internet is hardly a friendly, peaceful place. Indeed, it harbors countless scams and, more important from a business perspective, ...

Oct 17 2013
  Information security risk management for ISO27001/ISO27002
Calder A., Watkins S., It Governance Ltd, Cambridgeshire, England, UK, 2010. 198 pp.  Type: Book (978-1-849280-43-3)

The ISO27001 standard is becoming increasingly popular among organizations worldwide as it is the only standard that offers certification for having a solid information security management system (ISMS). Although certification by the I...

Dec 27 2010
  On the disclosure risk of multivariate microaggregation
Nin J., Herranz J., Torra V. Data & Knowledge Engineering 67(3): 399-412, 2008.  Type: Article

How do you perturb a data table in such a way that information loss and disclosure risk is at a minimum? Techniques from the field of microaggregation can be used for this purpose. For instance, a data table can be divided into multipl...

Apr 8 2009
  Privacy-preserving decision trees over vertically partitioned data
Vaidya J., Clifton C., Kantarcioglu M., Patterson A. ACM Transactions on Knowledge Discovery from Data 2(3): 1-27, 2008.  Type: Article

Iterative dichotomiser 3 (ID3) is a classification algorithm that uses a fixed set of examples to build a decision tree. This paper presents an interesting variant of the ID3 algorithm that can be used to classify vertically partitione...

Feb 4 2009
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy