Within the last year
Within the past 3 years
1 - 3 of 3 articles
This paper attempts to examine the major control and performance issues associated with database management systems. Monitoring and evaluation of database systems is necessary in order to maintain effective security, audit, and control in a computer-based environment. A database system must...
On September 17, 1986, SIGSAC cosponsored with SIG Small/PC a day long seminar on security in microcomputer systems. Nearly 100 people attended this program which was held at Bentley College, Waltham, Massachusetts.
Although computer security is usually thought of as data security, the protection of the executable software which creates and maintains that data is an equally important aspect of security. This article will describe the general principles for securing source code integrity in the computer...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.