Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (4): 57-58    DOI:
Current Issue | Archive | Adv Search |
Discussion on SQL Sever Database Security Mechanism
Chen Shuangquan
Wuhan Institute of Shipbuilding Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  SQL Sever database is a scalable, high-performance relational database management system, widely used in B / S mode site, C / S mode network applications. Data security has been the most important question for software and site, and also is one of the factors for the system to maintain normal operation. From the SQL Sever database security mechanisms, this paper discusses on purposes, ways, means and effect of maintaining the security of SQL Sever database.
Key wordsSQL Sever database      security mechanism      algorithm     
Published: 10 November 2017
ZTFLH:  TP311.13  

Cite this article:

Chen Shuangquan. Discussion on SQL Sever Database Security Mechanism. Computer & Telecommunication, 2016, 1(4): 57-58.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I4/57

[1] OU Wei-hong YANG Yong-qin. Research on the Book Recommendation System Based on Mahout under the Big Data Platform[J]. 电脑与电信, 2021, 1(9): 28-31.
[2] CAO Cong-hui LAN Qiang HOU Qun QI Wei-min . Research on Extraction Technology Based on Remote Learning[J]. 电脑与电信, 2021, 1(8): 1-5.
[3] SONG Man. A Film Collaborative Filtering Algorithm Based on BP Neural Network[J]. 电脑与电信, 2021, 1(6): 13-18.
[4] LIU Li-nan. CT Inversion Algorithm Based on BP Neural Network Optimized by Quantum Particle Swarm Optimization [J]. 电脑与电信, 2021, 1(6): 57-64.
[5] LIULiang-bin LIUDe-yu. PathPlanning ofWeldingRobotBased onGeneticAlgorithm[J]. 电脑与电信, 2021, 1(5): 18-21.
[6] ZHANG Kai-li HE Yue CHENG Ya-ru SUN Chen-jing CHEN Ya-ning JI Ya-fang. Real-time Tracking and Monitoring System Based on IMM Kalman Filtering Algorithm[J]. 电脑与电信, 2021, 1(5): 71-74.
[7] DENG Rui WEI Sheng-nan. Sewage Quality Prediction Based on LSTM Neural Network and DBSCAN Algorithm[J]. 电脑与电信, 2021, 1(4): 66-73.
[8] NIE Xin-yu LI Qin-qin LI Zhu. Improvement of LEACHAlgorithm Based on Extending WSN Life Cycle[J]. 电脑与电信, 2020, 1(8): 27-30.
[9] LIU Jie. Research on Service Route Strategy andAlgorithm of ROADM Network[J]. 电脑与电信, 2020, 1(8): 41-44.
[10] ZHANG Jie SU Qian HAN Zhong-tai. Optimization of WSN Coverage Based onArtificial Bee ColonyAlgorithm[J]. 电脑与电信, 2020, 1(6): 14-18.
[11] WANG Qiang JI Miao-miao LIU Li-pei LUO Tao QIAO Ke. Real Time Image Processing Based on FPGAand SobelAlgorithm[J]. 电脑与电信, 2020, 1(5): 24-28.
[12] ZHOU Ding-dong ZHANG Chun ZHANG Jie SU Qian. DV-Hop Wireless Sensor LocationAlgorithm Based on SimulatedAnnealingAlgorithm[J]. 电脑与电信, 2020, 1(5): 29-32.
[13] DENG Hong-yuan. Research on Identification of Radar Signal Features Based on Support Vector Machine Parameter Optimization[J]. 电脑与电信, 2020, 1(3): 44-46.
[14] ZHAO Hong-fei. Research on Query Optimization Technology of Distributed Database System[J]. 电脑与电信, 2020, 1(3): 55-58.
[15] CHANG Yun-jie WANG Sheng-Qin TAN Yang . Path Selecting Optimization for Emergency Rescue after Seismic Disaster Based on ImprovedAnt ColonyAlgorithm[J]. 电脑与电信, 2020, 1(1-2): 18-20.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd