
368 ◾ Appendix A
We have published three books in the second series. e first is Design and
Implementation of Data Mining Tools (Awad et al. 2009) and the second is Data
Mining Tools for Malware Detection (Masud et al. 2011). Our book Access Control
and Inference for Secure Data Provenance (Cadenhead et al. 2013) is the third in this
series. e relationship between these books as well as with our previous books is
illustrated in Figure A.13.
A.8 Summary and Directions
In this appendix, we have provided an overview of data management. We first
discussed the developments in data management and then provided a vision for
data management. en we illus ...