| 1 |
Lecture 1-General characteristics of methods, facilities and mechanismsof providing database security
|
|
|
2022-02-25
|
|
|
| 2 |
Lecture 2-Technical aspects of database security
|
|
|
2022-02-25
|
|
|
| 3 |
Lecture 3-Technologies of secure designing and administration
|
|
|
2022-02-25
|
|
|
| 4 |
Lecture 4-Models of database security
|
|
|
2022-02-25
|
|
|
| 5 |
Lecture 5- Organizing database access control based on role mode
|
|
|
2022-02-25
|
|
|
| 6 |
Lecture 6-Concept of information security in distributed system of database
|
|
|
2022-02-25
|
|
|
| 7 |
Lecture 7-Technology of data object linking
|
|
|
2022-02-25
|
|
|
| 8 |
Lecture 8-Specifics of conducting security audit in database management systems.
|
|
|
2022-02-25
|
|
|
| 9 |
Lecture 9-Database restore
|
|
|
2022-02-25
|
|
|
| 10 |
Lecture 10-Process of synchronization of replication in modern database management systems
|
|
|
2022-02-25
|
|
|
| 11 |
Lecture 11-Architecture and functional principle of database security subsystem
|
|
|
2022-02-25
|
|
|
| 12 |
Lecture 12-Protection shapes of database management system
|
|
|
2022-02-25
|
|
|
| 13 |
Lecture 13-Regulations for providing database security
|
|
|
2022-02-25
|
|
|
| 14 |
Exam
|
|
|
2022-02-25
|