Archive | November 2006

Database Management System Vendor Comparison

In this paper we discuss the important features to look for when purchasing DBMS software. We contrast two DBMS solutions. Read More…

Functional Dependence

In this article we discuss functional dependence and its relationship to database design.

Functional Dependence

AddThis Social Bookmark Button

Active Attacks On Computer Systems

In this paper I outline some of the most frequent attacks used against computer systems. Firstly we introduce the goals of computer security. Then we show how these can be affected by both external and internal threats.

Active Attacks On Computer Systems

AddThis Social Bookmark Button


Get every new post delivered to your Inbox.

Join 371 other followers

%d bloggers like this: