dc.contributor.author |
Haraty, Ramzi A. |
|
dc.contributor.author |
Hammoud, Ahmad |
|
dc.date.accessioned |
2018-02-05T10:35:49Z |
|
dc.date.available |
2018-02-05T10:35:49Z |
|
dc.date.issued |
2018-02-05 |
|
dc.identifier.uri |
http://hdl.handle.net/10725/7023 |
|
dc.language.iso |
en |
en_US |
dc.title |
Best Practices to Protect Databases behind RDBMS-Powered Web Applications |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.keywords |
Database security |
en_US |
dc.keywords |
Web applications |
en_US |
dc.identifier.ctation |
Hammoud, A., & Haraty, R. A. Best Practices to Protect Databases behind RDBMS-Powered Web Applications. |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
http://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdf |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |