1 minute read

Cyber Security

Database construction: advanced SQL queries, user actions  Implementing database features: database security features, database links (LAMP, WAMP), graphical user interfaces (GUI)  Database testing: testing plans, database components, extreme data, error handling

Indicative Content

Advertisement

 Database documentation: database architecture, database documentation components  Database development review: design review, code inspection, security inspection, post implementation review

This article is from: