APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY

  1. Polyinstantiation allows different records to exist in the same table at various security levels.
  2. Database models can be relational, using attributes (columns) and tuples (rows); hierarchical, combining records and fields in a logical tree structure; or distributed, storing information in more than one database.
  3. The system life cycle includes the following stages: project initiation, functional design and planning, system design, functional review, software development, product installation, operation and maintenance, and disposal and replacement.




CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg
Simiral book on Amazon

Flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net