Updating search results...

Search Resources

5 Results

View
Selected filters:
  • Authentication
Remix
Database
Unrestricted Use
CC BY
Rating
5.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Full Course
Author:
Mumtaj Yasmin
Date Added:
08/08/2019
Remix
Database Security
Unrestricted Use
CC BY
Rating
5.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Full Course
Provider:
Higher College of Technology, Muscat, Oman
Author:
Girija Narasimhan
Date Added:
08/08/2019
Remix
Database Security -Exercise and Case study Solution
Unrestricted Use
CC BY
Rating
5.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Computer Science
Material Type:
Activity/Lab
Case Study
Full Course
Interactive
Textbook
Unit of Study
Provider:
Higher College of Technology, Muscat, Oman
Author:
Girija Narasimhan
Date Added:
08/08/2019
Remix
Database Security -Lecture Notes(power point slides)
Unrestricted Use
CC BY
Rating
4.5 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Career and Technical Education
Material Type:
Activity/Lab
Full Course
Interactive
Unit of Study
Provider:
Higher College of Technology, Muscat, Oman
Author:
Girija Narasimhan
Date Added:
08/08/2019
Information Security (06:03): Authentication
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Our third video in our Information Security series (part of the Introduction to Computer course) focuses on Authentication. Authentication is basically proving you are who you say you are

There are three forms of authentication
•Something you know
•Something you have
•Something about you

Subject:
Information Science
Business and Communication
Material Type:
Lecture
Provider:
Mr. Ford's Class
Author:
Scott Ford
Date Added:
09/26/2014