In this paper we discuss the important features to look for when purchasing DBMS software. We contrast two DBMS solutions. Continue reading
In this article we discuss functional dependence and its relationship to database design.
In this paper I outline some of the most frequent attacks used against computer systems. Firstly we introduce the goals of computer security. Then we show how these can be affected by both external and internal threats.