Description
This textbook introduces and explains core concepts of database design, development, and administration. Special sections demonstrate how to first evaluate security threats and then design vital security components and integrate them into each application. Applied exercises and cases bring facts and data into the real world.