您要查找的是不是:
- Database security is only one concern for Web applications. 数据库安全性只是Web应用程序需要注意的一个方面。
- Intrusion Detection is an important means to achieve database security. 入侵检测是保障数据库安全的重要手段。
- In database security, a form of inference control that determines, inadvance, whether or not a set of statistics can is released without causingpersonal disclosure. 数据库保密学中的一种推理控制,它事先断定有些统计量是否可以公开而不会被人员泄露。
- It was presented the development background , design and implementation techniques of a database security add-on . 介绍数据库安全插件的研制背景,给出一个可以提高数据库安全性的安全插件的设计方案与实现技术。
- In database security, an information loss effect arising from the use of perturbation techniques in inference control. 数据库安全学中,由于在引用控制中使用扰动技术而带来的信息丢失。
- Database security is that protect database and prevent lawless user caused the data leak、amend and shatter. 数据库的安全性是指保护数据库,以防止非法用户使用所造成的数据泄露、修改或损坏。
- With the database technology widespread application,the database security also more and more receives takes. 随着数据库技术的广泛应用,数据库的安全也越来越受到重视。
- While database security at the table or column level is necessary in some scenarios, it is import to consider how it affects ad hoc report navigation. 尽管在某些情况下有必要在表或列级别上设置数据库安全性,但考虑其对即席报表浏览的影响也非常重要。
- The database security is one importont link in designing databse application system. This article produces several methods in the VFP software design. 摘要数据库的安全性是设计数据库应用系统的一个重要环节,本文给出了在VFP软件设计中安全技术研究的几种方法。
- In database security,a form of inference control that determines,inadvance,whether or not a set of statistics can be released without causing personal disclosure. 数据库保密学中的一种推理控制,它事先断定有些统计量是否可以公开而不会被人员泄露。
- To transfer ownership of database securables, use ALTER AUTHORIZATION. 若要转移数据库安全对象的所有权,请使用ALTER AUTHORIZATION。
- Based on the discussions of DataBase security, system security and application security, it was analysied the security of MySQL systematically, and given some solutions. 通过对系统安全、数据库安全和应用安全3方面的阐述,系统地分析了MySQL数据库的安全问题,并提出了相应的解决方法。
- So,firstly expatiate the summarize of the database security,then analysis the typical database security technique,finally study the ORACLE database security technique. 为此,首先阐述了数据库安全概述,接着分析了典型数据库的安全技术,最后研究了ORACLE数据库安全。
- An identity protocol model aimed to improve the Kerberos protocol is put forward to provide a scheme of database security from client application program to application server. 建立了一个基于改进的身份认证模型,提供了客户端应用程序到应用服务器的数据库系统安全解决方案。
- In database security, an information loss effect arising from the use of perturbation techniques in inference control.It is defined as the difference between the expectation of the perturbed statistic and its true value. 数据库安全学中,由于在引用控制中使用扰动技术而带来的信息丢失。它定义为受扰动统计量的期望值与实际值之差。
- In database security, an information loss effect arising from the use of perturbation techniques in inference control. It is defined as the difference between the expectation of the perturbed statistic and its true value. 数据库安全学中,由于在引用控制中使用扰动技术而带来的信息丢失。它定义为受扰动统计量的期望值与实际值之差。
- At a minimum, team members should understand referential integrity and database security, and have a good grasp on the various technologies and data formats used to transfer data between the user and the database. 团队成员应该理解引用完整性和数据库安全性,并且在用户和数据库之间,能够很好的领会不同种的技术和用于传输的数据格式。
- This paper investigates implementation of J2EE-based Web system and its security problems, such as identity authentication, security audit, EJB transaction security, EJB method access control and database security. 研究了基于J2 EE分布式模型的Web应用系统的实现及该应用系统的安全问题;如身份认证、安全审计、EJB事务安全、EJB方法访问控制、数据库安全等.
- Based on attack model of database, A model of database intrusion prevention system (DIPS) is proposed. The model extends the COAST firewall model with intrusion detection and updates database security from passive protection to proactive protection. 本文在分析数据库入侵攻击的基础上提出了一个层次化的数据库入侵防护模型,该模型是在Coast通用防火墙模型的基础之上,扩展了数据库的入侵检测功能,实现了数据库的安全保护由被动防御向主动防御的转变。
- Besides, the paper makes a qualitative research on the characters of data security and database security in DSU system. And the emphasis is that how the construction of DSU represent the demand of data security. 此外,论文还对DSU中的数据安全以及数据库安全性特点进行了的定性研究,并重点分析了DSU的结构是如何体现数据安全性要求的。