.

Best Practices to Protect Databases behind RDBMS-Powered Web Applications

LAUR Repository

Show simple item record

dc.contributor.author Haraty, Ramzi A.
dc.contributor.author Hammoud, Ahmad
dc.date.accessioned 2018-02-05T10:35:49Z
dc.date.available 2018-02-05T10:35:49Z
dc.date.issued 2018-02-05
dc.identifier.uri http://hdl.handle.net/10725/7023
dc.language.iso en en_US
dc.title Best Practices to Protect Databases behind RDBMS-Powered Web Applications en_US
dc.type Conference Paper / Proceeding en_US
dc.author.school SAS en_US
dc.author.idnumber 199729410 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.keywords Database security en_US
dc.keywords Web applications en_US
dc.identifier.ctation Hammoud, A., & Haraty, R. A. Best Practices to Protect Databases behind RDBMS-Powered Web Applications. en_US
dc.author.email rharaty@lau.edu.lb en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url http://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdf en_US
dc.orcid.id https://orcid.org/0000-0002-6978-3627 en_US
dc.author.affiliation Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account