Showing
1 - 20
results of
45
for search '
Jajodia, Sushil.
'
Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Author
Jajodia, Sushil.
Showing
1 - 20
results of
45
for search '
Jajodia, Sushil.
'
, query time: 0.05s
Narrow Search
Sort
Relevance
Newest
Oldest
Call Number
Author
Title
Select all entries on the page
Email
Export
Print
Save
Select result number 1
1
Trusted Recovery and Defensive Information Warfare by Peng Liu, Sushil Jajodia.
by
Peng Liu
,
Jajodia, Sushil
Published 2002
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 2
2
Preserving Privacy in On-Line Analytical Processing (OLAP) by Lingyu Wang, Sushil Jajodia, Duminda Wijesekera.
by
Wang, Lingyu
,
Jajodia, Sushil
,
Wijesekera, Duminda
Published 2007
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 3
3
Network Security Metrics by Lingyu Wang, Sushil Jajodia, Anoop Singhal.
by
Wang, Lingyu
,
Jajodia, Sushil
,
Singhal, Anoop
Published 2017
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 4
4
Network Hardening An Automated Approach to Improving Network Security by Lingyu Wang, Massimiliano Albanese, Sushil Jajodia.
by
Wang, Lingyu
,
Albanese, Massimiliano
,
Jajodia, Sushil
Published 2014
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 5
5
Time Granularities in Databases, Data Mining, and Temporal Reasoning by Claudio Bettini, Sushil Jajodia, Sean Wang.
by
Bettini, Claudio
,
Jajodia, Sushil
,
Wang, Sean
Published 2000
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 6
6
Multilevel Secure Transaction Processing by Vijay Atluri, Sushil Jajodia, Binto George.
by
Atluri, Vijay
,
Jajodia, Sushil
,
George, Binto
Published 2000
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 7
7
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures by Neil F. Johnson, Zoran Duric, Sushil Jajodia.
by
Johnson, Neil F.
,
Duric, Zoran
,
Jajodia, Sushil
Published 2001
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 8
8
Intrusion Detection in Distributed Systems An Abstraction-Based Approach by Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang.
by
Peng Ning
,
Jajodia, Sushil
,
Wang, Xiaoyang Sean
Published 2004
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 9
9
Database Security XII Status and Prospects edited by Sushil Jajodia.
Published 1999
Other Authors:
“…
Jajodia, Sushil
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 10
10
Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings edited by Sushil Jajodia.
Published 2008
Other Authors:
“…
Jajodia, Sushil
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 11
11
Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings edited by Sara Foresti, Sushil Jajodia.
Published 2010
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 12
12
Security and Privacy in Communication Networks 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings edited by Sushil Jajodia, Jianying Zhou.
Published 2010
Other Authors:
“…
Jajodia, Sushil
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 13
13
Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings edited by Sushil Jajodia, Duminda Wijesekera.
Published 2005
Other Authors:
“…
Jajodia, Sushil
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 14
14
Information Systems Security First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings edited by Sushil Jajodia, Chandan Mazumdar.
Published 2005
Other Authors:
“…
Jajodia, Sushil
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 15
15
Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings edited by Sushil Jajodia, Chandan Mazumdar.
Published 2011
Other Authors:
“…
Jajodia, Sushil
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 16
16
Handbook of Database Security Applications and Trends edited by Michael Gertz, Sushil Jajodia.
Published 2008
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 17
17
Integrity and Internal Control in Information Systems VI IFIP TC11 / WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13–14 November... edited by Sushil Jajodia, Leon Strous.
Published 2004
Other Authors:
“…
Jajodia, Sushil
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 18
18
Advanced Transaction Models and Architectures edited by Sushil Jajodia, Larry Kerschberg.
Published 1997
Other Authors:
“…
Jajodia, Sushil
…”
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 19
19
Secure Data Management in Decentralized Systems edited by Ting Yu, Sushil Jajodia.
Published 2007
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select result number 20
20
Multimedia Database Systems Issues and Research Directions edited by V.S. Subrahmanian, Sushil Jajodia.
Published 1996
Other Authors:
Call Number:
Loading…
Located:
Loading…
Click to view e-book
eBook
Save to List
Saved in:
Select all entries on the page
Email
Export
Print
Save
1
2
3
Next
[3]
Search Tools:
Get RSS Feed
Email this Search
Related Subjects
Electronic resources (E-books)
Computer communication systems
Data encryption (Computer science)
Application software
Computer science
Data structures (Computer science)
Management information systems
Computer security
Computers
Information storage and retrieval
Database management
Business—Data processing
Information technology
Algorithms
Software engineering
E-commerce
Natural language processing (Computer science)
Operating systems (Computers)
Artificial intelligence
Computer organization
Computer logic
Computers and civilization
Electrical engineering
Law and legislation
Accounting
Applied mathematics
Architecture, Computer
Bookkeeping
Business mathematics
Coding theory