1 |
Lecture 1-General characteristics of methods, facilities and mechanismsof providing database security
|
|
|
2022-02-25
|
|
2 |
Lecture 2-Technical aspects of database security
|
|
|
2022-02-25
|
|
3 |
Lecture 3-Technologies of secure designing and administration
|
|
|
2022-02-25
|
|
4 |
Lecture 4-Models of database security
|
|
|
2022-02-25
|
|
5 |
Lecture 5- Organizing database access control based on role mode
|
|
|
2022-02-25
|
|
6 |
Lecture 6-Concept of information security in distributed system of database
|
|
|
2022-02-25
|
|
7 |
Lecture 7-Technology of data object linking
|
|
|
2022-02-25
|
|
8 |
Lecture 8-Specifics of conducting security audit in database management systems.
|
|
|
2022-02-25
|
|
9 |
Lecture 9-Database restore
|
|
|
2022-02-25
|
|
10 |
Lecture 10-Process of synchronization of replication in modern database management systems
|
|
|
2022-02-25
|
|
11 |
Lecture 11-Architecture and functional principle of database security subsystem
|
|
|
2022-02-25
|
|
12 |
Lecture 12-Protection shapes of database management system
|
|
|
2022-02-25
|
|
13 |
Lecture 13-Regulations for providing database security
|
|
|
2022-02-25
|
|
14 |
Exam
|
|
|
2022-02-25
|