Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
456766 | Infosecurity | 2008 | 4 Pages |
Abstract
Due to the horrifying quantity of vulnerabilities, and often limited time and budget, application and database security can be quite a headache. Limiting privileges and access, however, is a good place to start, finds Danny Bradbury
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Danny Bradbury,