ch05 - Computer Security: Principles and Practice Chapter 5...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 5 Chapter 5 Database Security Database Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 Database Security
Background image of page 2
3 Relational Databases constructed from tables of data each column holds a particular type of data each row contains a specific value these ideally has one column where all values are unique, forming an identifier/key for that row have multiple tables linked by identifiers use a query language to access data items meeting specified criteria
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 Relational Database Example
Background image of page 4
5 Relational Database Elements relation / table / file tuple / row / record attribute / column / field primary key uniquely identifies a row foreign key links one table to attributes in another view / virtual table
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6 Relational Database Elements
Background image of page 6
7 Structured Query Language Structure Query Language (SQL) originally developed by IBM in the mid-1970s standardized language to define, manipulate, and query data in a relational database several similar versions of ANSI/ISO standard CREATE TABLE department ( Did INTE G E R PRIMAR Y KEY, Dname CHAR (30), Dacctno CHAR (6) ) C R E A T E TA B L E e m ployee ( Ename CHAR (30), Did INTEGER, SalaryCodeINTEGER, Eid INTE G E R PRIMAR Y KEY, Ephone CHAR (10),
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 24

ch05 - Computer Security: Principles and Practice Chapter 5...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online