Resources

Data Protection from Insider Threats

Author : Bertino 

Morgan & Claypool

Access online

Database Repairs and Consistent Query Answering

Author : Bertossi 

Morgan & Claypool

Access online

Declarative Networking

Author : Loo 

Morgan & Claypool

Access online