Data base security through simulation
This research explores the complexities of database security, encompassing both the computer hardware and software. Also important is its nature as a people oriented issue. A risk analysis of a database system's security can be examined by creating a simulation model. Though, in order for it to...
Main Author: | Hong, Seng-Phil |
---|---|
Other Authors: | Ball State University. Dept. of Computer Science. |
Format: | Others |
Published: |
2011
|
Subjects: | |
Online Access: | http://cardinalscholar.bsu.edu/handle/handle/185102 http://liblink.bsu.edu/uhtbin/catkey/902465 |
Similar Items
-
Design factors for the communication architecture of distributed discrete event simulation systems
by: Hoaglund, Catharine McIntire
Published: (2006) -
Computer security : data control and protection
by: Neophytou, Andonis
Published: (2011) -
Hardware program simulator
by: Navabi, Zainalabedin, 1952-
Published: (1978) -
Security concept: System approach: System archetypes implementation in risk management
by: Džigurski Ozren
Published: (2019-01-01) -
Improving Security Through Egalitarian Binary Recompilation
by: Williams-King, David Christopher
Published: (2021)