Archive | November 2006

Database Management System Vendor Comparison


In this paper we discuss the important features to look for when purchasing DBMS software. We contrast two DBMS solutions. Read More…

Functional Dependence


In this article we discuss functional dependence and its relationship to database design.

Functional Dependence

AddThis Social Bookmark Button

Active Attacks On Computer Systems


In this paper I outline some of the most frequent attacks used against computer systems. Firstly we introduce the goals of computer security. Then we show how these can be affected by both external and internal threats.

Active Attacks On Computer Systems

AddThis Social Bookmark Button

Follow

Get every new post delivered to your Inbox.

Join 346 other followers

%d bloggers like this: