Escolar Documentos
Profissional Documentos
Cultura Documentos
Liberty University
CSIS 325
1. Define a database.
b. Explaining popular types of databases and what they are used for.
References
Cyber Attacks Explained Database Hacking (Part 7). (2012, April 30). LINUX For You. Retrieved from
http://link.galegroup.com.ezproxy.liberty.edu/apps/doc/A288424550/ITOF?u=vic_liberty&sid=ITOF&xid
=c25d9af8
Berrington, J. (2016;2017;). databases. Anaesthesia and Intensive Care Medicine, 18(3), 155-157.
doi:10.1016/j.mpaic.2016.11.016
Meg Coffin Murray (2010). Journal of Information Technology Education: Innovations in Practice.
Retrieved from https://doi.org/10.28945/1132
Burtescu, E. (2009). Database security--attacks and control methods. Journal of Applied Quantitative
Methods, 4(4), 449+. Retrieved from
http://link.galegroup.com.ezproxy.liberty.edu/apps/doc/A353753710/AONE?u=vic_liberty&sid=AONE&
xid=cf8ede64
Bertino, E., & Sandhu, R. (2005). Database security - concepts, approaches, and challenges.IEEE
Transactions on Dependable and Secure Computing, 2(1), 2-19. doi:10.1109/TDSC.2005.9
Bamrara, A. (2015). Evaluating database security and cyber attacks: A relational approach. Journal of
Internet Banking and Commerce, 20(2), 1-17. Retrieved from
http://ezproxy.liberty.edu/login?url=https://search-proquest-
com.ezproxy.liberty.edu/docview/1799378132?accountid=12085