Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'au:"Jajodia, Sushil"'
Refine your search
Availability
Limit to records with available items
Authors
Atluri, Vijay
Barbara, Daniel
Bettini, Claudio
George, Binto
Jajodia, Sushil
Jajodia, Sushil et a...
Kerschberg, Larry
Liu, Peng
Ning, Peng
Strous, Leon
Wang, Sean
Show more
Show less
Item types
English Books
Reference
Topics
Computer crimes - In...
Computer networks - ...
Computer networks - ...
Computer Science
Computer security
Computer security - ...
Computer security - ...
Computers - Access c...
Data mining
Data recovery (Compu...
Database management
Database security
Database security - ...
Defensive (Military ...
Information resource...
Information resource...
Information warfare
Temporal databases
Transaction systems ...
Show more
Show less
Your search returned 11 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Multilevel secure transaction processing
by Vijay Atluri, Sushil Jajodia, Binto George
by
Atluri, Vijay
George, Binto
Jajodia, Sushil
Publication details:
Dordrecht ; Boston
Kluwer Academic
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.74 ATL
.
2.
Time granularities in databases, data mining, and temporal reasoning
Claudio Bettini, Sushil Jajodia, Sean Wang
by
Bettini, Claudio
Jajodia, Sushil
Wang, Sean
Publication details:
Berlin
Springer
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
006.3 BET
.
3.
Trusted recovery and defensive information warfare
by Peng Liu, Sushil Jajodia
by
Liu, Peng
Jajodia, Sushil
Publication details:
Boston, MA
Kluwer Academic
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.62 LIU
.
4.
Database security XII : status and prospects : IFIP TC11 WG11.3 twelfth international working conference on database security, July 15-17, 1998, Chalkidiki, Greece
edited by Sushil Jajodia
by
Jajodia, Sushil
IFIP TC11/WG 11.3 International Conference on Database Security (12th : 1998 : Chalkidiki, Greece)
Publication details:
Boston, MA
Kluwer Academic Publishers
1999
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JAJ
.
5.
Integrity and internal control in information systems : IFIP TC11 working group 11.5 working conference on integrity and internal control in information systems, bridging business requirements and research results : Warrenton, Virginia, USA, November 19-20, 1998
edited by Sushil Jajodia ... [et al.]
by
Jajodia, Sushil
IFIP TC11 Working Group 11.5 Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results (2nd : 1998 : Warrenton, Va.)
Publication details:
Dordrecht ; Boston
Kluwer Academic
1998
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.4038 JAJ
.
6.
Integrity and internal control on information systems VI : IFIP TC11/WG11.5 sixth working conference on integrity and internal control in information systems (IICIS), 13-14 November 2003, Lausanne, Switzerland
edited by Sushil Jajodia, Leon Strous
by
Jajodia, Sushil
Strous, Leon
IFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (6th : 2003 : Lausanne, Switzerland)
Publication details:
Dordrecht ; Boston
Kluwer Academic
c2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004 JAJ
.
7.
Intrusion detection in distributed systems : an abstraction-based approach
by Peng Ning, Sushil Jajodia, X. Sean Wang
by
Ning, Peng
Jajodia, Sushil
Wang, Sean
Publication details:
Dorcrecht ; Boston
Kluwer Academic Publishers
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NIN
.
8.
Advanced transaction models and architectures
edited by Sushil Jajodia and Larry Kerschberg
by
Jajodia, Sushil
Kerschberg, Larry
Publication details:
Boston
Kluwer Academic Publishers
c1997
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.74 JAN
.
9.
Applications of data mining in computer security
edited by Daniel Barbarʹa, Sushil Jajodia
by
Barbara, Daniel
Jajodia, Sushil
Publication details:
Boston
Kluwer Academic Publishers
c2002
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 BAR, ..
.
10.
Secure Cloud Computing
/ Jajodia, Sushil Et Al
by
Jajodia, Sushil et al
Edition:
1st edition
Publication details:
Springer
2020
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
4.67 JAJ
.
11.
Secure Cloud Computing
/ Jajodia, Sushil Et Al
by
Jajodia, Sushil et al
Publication details:
2020
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JAJ
.
Pages
Find us on the map
Powered by
Koha