Updating search results...

Search Resources

6 Results

View
Selected filters:
  • authentication
Database
Unrestricted Use
CC BY
Rating
0.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Full Course
Date Added:
10/14/2018
Database Security
Unrestricted Use
CC BY
Rating
0.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Full Course
Date Added:
05/12/2017
Database Security -Exercise and Case study Solution
Unrestricted Use
CC BY
Rating
0.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Case Study
Full Course
Interactive
Textbook
Unit of Study
Date Added:
04/11/2017
Database Security -Lecture Notes(power point slides)
Unrestricted Use
CC BY
Rating
0.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Activity/Lab
Full Course
Interactive
Unit of Study
Date Added:
04/05/2018
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Applied Science
Business and Communication
Information Science
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014
Network and Computer Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.

Subject:
Applied Science
Computer Science
Engineering
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Rivest, Ronald
Date Added:
02/01/2014