Have a personal or library account? Click to login

Considerations Regarding Methods that Ensure Database Information Management and Security

Open Access
|Jul 2016

References

  1. [1] Burtea E., Hurloiu L., Meruţă A., Managementul societăţii cunoaşterii în context european, CEN 2012, Vol. “Echilibre şi dezechilibre ale pieţei româneşti în perioada actuală, Ed. Universitară, Bucureşti, 2012.
  2. [2] Helms, Remko W., Product Data Management as enabler for Concurrent Engineering, University Press of Eindhoven University of Technology, 2002.
  3. [3] Hurloiu L., Burtea E., Hurloiu I. I., Meruță A., Preda B.F., Șerban M., Ștefan R.M. - Documentele financiar contabile – Management, control, audit, clasificare și securitate, Chișinău 2014.
  4. [4] Jain, A.K., Murty, M.N., Flynn, P.J., Data clustering: a review. ACM Computing Surveys, Vol. 31, No. 3, September 1999;10.1145/331499.331504
  5. [5] Lungu I., Bodea C., Bădescu G., Ioniţă C. - Baze de date, Organizare, proiectare şi implementare, Editura All, Bucureşti, 1995.
  6. [5] Mihăescu L. – Informatizarea sistemului de comunicații a firmei, Ed. Universității Lucian Blaga, Sibiu, 2009.
  7. [7] Șerban M. - Frequently Used Methods for Securing Databases, International Journal Of Education And Research, Published by Contemporary Research Center (CRC), Australia, Vol. 1, No. 4 April 2013, p. 201-208.
Language: English
Page range: 567 - 571
Published on: Jul 27, 2016
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2016 Măriuţa Şerban, Raluca-Mariana Ştefan, Lăcrămioara-Rodica Hurloiu, Alexandrina Meruţă, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.