05236nam 22006134a 450 991045482360332120200520144314.01-280-20580-697866102058060-306-47008-X10.1007/b115728(CKB)111056486606580(EBL)3035684(SSID)ssj0000134968(PQKBManifestationID)11154833(PQKBTitleCode)TC0000134968(PQKBWorkID)10056852(PQKB)11057732(DE-He213)978-0-306-47008-0(MiAaPQ)EBC3035684(Au-PeEL)EBL3035684(CaPaEBR)ebr10052999(CaONFJC)MIL20580(OCoLC)923696534(EXLCZ)9911105648660658020010718d2001 uy 0engur|n|---|||||txtccrData and applications security[electronic resource] developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 /edited by Bhavani Thuraisingham ... [et al.]1st ed. 2001.Boston Kluwer Academic Publishers20011 online resource (391 p.)International Federation for Information Processing ;73Description based upon print version of record.0-7923-7514-9 Includes bibliographical references and index.Protecting Information when Access is Granted for Collaboration -- Author-?: A Java-Based System For XML Data Protection -- A Fair-Exchange E-Commerce Protocol With Automated Dispute Resolution -- XML Access Control Systems: A Component-Based Approach -- A Configurable Security Architecture Prototype -- Distributed Policies for Data Management — Making Policies Mobile -- Security Architecture of The Multimedia Mediator -- Simulation And Analysis of Cryptographic Protocols -- Authentic Third-Party Data Publication -- Protecting File Systems Against Corruption Using Checksums -- Web Security and Privacy -- Coordinating Policy for Federated Applications -- Integrating Multilevel Security Policies in Multilevel Federated Database Systems -- Wrappers – A Mechanism to Support State-Based Authorization in Web Applications -- An Integrated Framework for Database Privacy Protection -- Discovery of Multi-Level Security Policies -- Protecting Deductive Databases from Unauthorized Retrievals -- Confidentiality vs Integrity in Secure Databases -- Extending SQL’s Grant Operation to Limit Privileges -- Language Extensions for Programmable Security -- Protecting Privacy from Continuous High-Resolution Satellite Surveillance -- Database Security Integration Using Role-Based Access Control -- User Role-Based Security Model for a Distributed Environment -- WorkFlow Analyzed for Security and Privacy in using Databases -- Identifying Security Holes in OLAP Applications -- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations -- Database Security 2000 -- Declarative Semantics of Belief Queries in Mls Deductive Databases -- Trust Management in Distributed Databases -- Active Authorization as High-level Control -- Conference Key Agreement Protocol using Oblivious Transfer -- An Integration Model of Role-Based Access Control and Activity-Based Access Control Using Task -- Authorization Model in Object-Oriented Systems -- Panel 2 -- Conference Summary.New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the whole of society. Data and Applications Security covers issues related to security and privacy of information in a wide range of applications, including: Electronic Commerce, XML and Web Security; Workflow Security and Role-based Access Control; Distributed Objects and Component Security; Inference Problem, Data Mining and Intrusion Detection; Language and SQL Security; Security Architectures and Frameworks; Federated and Distributed Systems Security; Encryption, Authentication and Security Policies. This book contains papers and panel discussions from the Fourteenth Annual Working Conference on Database Security, which is part of the Database Security: Status and Prospects conference series sponsored by the International Federation for Information Processing (IFIP). The conference was held in Schoorl, The Netherlands in August 2000.International Federation for Information Processing (Series) ;73.Database securityCongressesElectronic books.Database security005.8Thuraisingham Bhavani M253930MiAaPQMiAaPQMiAaPQBOOK9910454823603321Data and applications security1894248UNINA03692nam 2200697Ia 450 991079232320332120230207213452.01-282-74840-897866127484001-55861-654-3(CKB)2670000000018966(EBL)530363(OCoLC)630541456(SSID)ssj0000488283(PQKBManifestationID)11328890(PQKBTitleCode)TC0000488283(PQKBWorkID)10446449(PQKB)10272150(MiAaPQ)EBC530363(OCoLC)1017610788(MdBmJHUP)muse61113(Au-PeEL)EBL530363(CaPaEBR)ebr10372925(EXLCZ)99267000000001896620090811d2009 uy 0engur|n|---|||||txtccrThe war before[electronic resource] the true life story of becoming a Black Panther, keeping the faith in prison, and fighting for those left behind /Safiya Bukhari; edited by Laura WhitehornNew York Feminist Press at the City University of New York20091 online resource (313 p.)Includes index.1-55861-610-1 Includes bibliographical references and index.Preface / by Wonda White Jones -- Foreword by Angela Y. Davis -- Introduction / by Laura Whitehorn -- Coming of age : a Black revolutionary -- Testimony : experiences in the Black Panther Party -- Marriage contract : Safiya A. Bukhari and Michael M (Ashanti) Alston -- What is security? And the ballot or the bullet ... revisited -- Enemies and friends : resolving contradictions -- On the question of sexism within the Black Panther Party -- "Islam and revolution" is not a contradiction -- We too are also veterans : post-traumatic stress disorders and the Black Panter Party -- This is worth fighting for -- On the question of political prisoners -- Building support for political prisoners of war incarcerated in North America -- Talks on the Black Panter Party and the Black liberation struggle -- Lest we forget -- CBS tries the New York three -- Talking about Assata Shakur -- Free Mumia Abu-Jamal! -- COINTELPRO and the case of Mumia Abu-Jamal -- Safiya interviews Albert Nuh Washington -- Letter for the parole of Jalil Muntaqim -- Q & A on Jericho 98 -- Debate: should we grant amnesty to America's political prisoners? -- Kamau Sadiki : injustice continues ... -- Afterword / by Mumia Abu-Jamal.From the Black Panthers to political prisoners, one woman's politics paves the way for today's breakthroughs.African American women political activistsBiographyAfrican American womenBiographyWomen prisonersWest VirginiaBiographyAfrican AmericansCivil rightsHistorySourcesCivil rights movementsUnited StatesHistorySourcesSocial justiceUnited StatesHistorySourcesUnited StatesRace relationsHistorySourcesAfrican American women political activistsAfrican American womenWomen prisonersAfrican AmericansCivil rightsHistoryCivil rights movementsHistorySocial justiceHistory973.04960730092Bukhari Safiya1950-2003.1585110Whitehorn Laura1585111MiAaPQMiAaPQMiAaPQBOOK9910792323203321The war before3869408UNINA01682nam 2200553 a 450 991082761740332120230124183918.01-62257-219-X(CKB)2550000001043572(EBL)3021663(SSID)ssj0000874622(PQKBManifestationID)12445915(PQKBTitleCode)TC0000874622(PQKBWorkID)10888071(PQKB)11191082(MiAaPQ)EBC3021663(Au-PeEL)EBL3021663(CaPaEBR)ebr10683402(OCoLC)834129257(EXLCZ)99255000000104357220110909d2012 uy 0engur|n|---|||||txtccrData collection and storage[electronic resource] /Julian R. Eiras, editorNew York Nova Science Publishers, Inc.c20121 online resource (124 p.)Computer science, technology and applicationsDescription based upon print version of record.1-61209-689-1 Includes bibliographical references and index.Computer science, technology and applications.DatabasesComputer storage devicesScienceData processingDatabases.Computer storage devices.ScienceData processing.004.5Eiras Julian R1597384MiAaPQMiAaPQMiAaPQBOOK9910827617403321Data collection and storage3919129UNINA01313nam 2200409 450 991080744470332120230612222053.0(CKB)1000000000771858(OCoLC)568021322(MiAaPQ)EBC3411423(NjHacI)991000000000771858(EXLCZ)99100000000077185820230612d2003 uy 0engur|n####a|||atxt $rdacontentcrdamediacrrdacarrierData storage pushing the physical limits /Technology Research News,editorBoston, MA :Technology Research News,2003.1 online resource (38 pages) illustrationsTRN's making the future report ;no. 2 (Jan. 2003)TRN's making the future report ;no. 2.Information retrievalComputer storage devicesInformation Storage and Retrieval(DNLM)D016247Information retrieval.Computer storage devices.Information Storage and Retrieval.004.5Technology Research News,NjHacINjHaclBOOK9910807444703321Data storage2039189UNINA01686nas 2200529-a 450 99621138850331620240413012216.0(CKB)954921415437(CONSER)---87642283-(EXLCZ)9995492141543719870409b19861996 --- aengtxtrdacontentcrdamediacrrdacarrierIPA reviewMelbourne Institute of Public Affairs1986-19961 online resourceRefereed/Peer-reviewedTitle from cover.Print version: IPA review (Melbourne, Vic. : 1986) 1030-4177 (DLC) 87642283 (OCoLC)15506576 Institute of Public Affairs reviewIPA rev.EconomicsPeriodicalsEconomic historyfast(OCoLC)fst00901974Economicsfast(OCoLC)fst00902116CURRENT EVENTSunbistSOCIAL CONDITIONSunbistAUSTRALIAunbistAustraliaEconomic conditions1945-PeriodicalsAustraliafasthttps://id.oclc.org/worldcat/entity/E39QbtfRv8PPH7gCqhkJ8DK8bMPeriodicals.fastPeriodicals.lcgftPeriodicals.lcgftEconomicsEconomic history.Economics.CURRENT EVENTS.SOCIAL CONDITIONS.AUSTRALIA.330/.05Institute of Public Affairs (Australia)JOURNAL996211388503316exl_impl conversionIPA review2221972UNISA00735nam0-2200265 --450 991087009920332120240712134349.020240712d kmuy0itay5050 baengGB 001yyVegetation and the atmosphereedited by J. L. MonteithLondon [etc.]Academic pressv.24 cmColtivazione63123itaMonteith,John LennoxITUNINAREICATUNIMARCBK9910870099203321A MIC 2803-19839/2024FAGBCA MIC 2803-29840/2024FAGBCFAGBCVegetation and the atmosphere4175908UNINA