Security Controls for Database Technology and Applications

Security Controls for Database Technology and Applications

Zoltán Kincses
Copyright: © 2005 |Pages: 6
ISBN13: 9781591405603|ISBN10: 1591405602|EISBN13: 9781591407959
DOI: 10.4018/978-1-59140-560-3.ch096
Cite Chapter Cite Chapter

MLA

Kincses, Zoltán. "Security Controls for Database Technology and Applications." Encyclopedia of Database Technologies and Applications, edited by Laura C. Rivero, et al., IGI Global, 2005, pp. 581-586. https://doi.org/10.4018/978-1-59140-560-3.ch096

APA

Kincses, Z. (2005). Security Controls for Database Technology and Applications. In L. Rivero, J. Doorn, & V. Ferraggine (Eds.), Encyclopedia of Database Technologies and Applications (pp. 581-586). IGI Global. https://doi.org/10.4018/978-1-59140-560-3.ch096

Chicago

Kincses, Zoltán. "Security Controls for Database Technology and Applications." In Encyclopedia of Database Technologies and Applications, edited by Laura C. Rivero, Jorge Horacio Doorn, and Viviana E. Ferraggine, 581-586. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-560-3.ch096

Export Reference

Mendeley
Favorite

Abstract

The word security has many meanings, even for the programmers and other members of the computer science community, but it is often inferred by frequently used keywords, such as threat, vulnerability, exploit, risk, and related expressions such as attack, circumvention, manipulation, sniffing, denial of service, malicious, privacy, and so forth.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.