Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (6): 85-89    DOI: 10.11925/infotech.1003-3513.2004.06.23
Current Issue | Archive | Adv Search |
Research of SQL Server Database Security Management
Wang Zhanghong
(Library of Chongqing University, Chongqing 400044, China)
Download: PDF(0 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper introduce the method of building SQL Server database security control strategy,the method of database backup by using SQL Server enterprise manager or application program,and the method of database restore.

Key wordsSQL Server      Database      Security      Backup     
Received: 19 January 2004      Published: 25 June 2004
: 

TP311.11

 
Corresponding Authors: Wang Zhanghong     E-mail: fastzhwang@263.net
About author:: Wang Zhanghong

Cite this article:

Wang Zhanghong. Research of SQL Server Database Security Management. New Technology of Library and Information Service, 2004, 20(6): 85-89.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.06.23     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I6/85

[1] Haixia Sun,Lei Wang,Yingjie Wu,Weina Hua,Junlian Li. Matching Strategies for Institution Names in Literature Database[J]. 数据分析与知识发现, 2018, 2(8): 88-97.
[2] Longjia Jia,Bangzuo Zhang. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[3] Guang Zhu,Mining Feng,Weiwei Zhang. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[4] Wen’gang Feng,Yan Li,Fuhai Li,Xin Wang,Xiping Zhou. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[5] Wengang Feng,Jing Huang. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[6] Dongsheng Zhai, He Liu, Jie Zhang, Liwei Cai. Managing Patent Semantic Knowledge with Graph Database[J]. 数据分析与知识发现, 2016, 32(12): 66-75.
[7] Gao Guangshang, Zhang Zhixiong. Survey on Entity Resolution over Relational Databases[J]. 现代图书情报技术, 2015, 31(7-8): 37-47.
[8] Hao Hui. A Duplicate Removal Algorithm of Cross-database Search Based on Sci-tech Novelty Retrieval[J]. 现代图书情报技术, 2015, 31(1): 89-95.
[9] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
[10] Zhai Dongsheng, Zhang Xinqi, Zhang Jie, Kang Ning. The Design and Implementation of Distributed Patent Information Extraction System[J]. 现代图书情报技术, 2013, 29(7/8): 114-121.
[11] Wang Xiaoliang, Wang Wei. Constructing Statistical Analysis System of Electronic Periodical Databases Based on the Firewall Log Mining[J]. 现代图书情报技术, 2013, 29(7/8): 122-126.
[12] Zhao Yan, Chen Heng. A Method to Improve Accuracy of Automatic Indexing for Chinese-English Mixed Text[J]. 现代图书情报技术, 2012, 28(6): 36-42.
[13] Huang Yong. Design and Implementation of GIS Applications for Overseas Chinese Students Database[J]. 现代图书情报技术, 2012, 28(5): 91-95.
[14] Hu Tao, Wei Tao, Xu Haijun. Design and Implement Security Gateway System Based on Open Source Software Used in Electronic Reading Room[J]. 现代图书情报技术, 2012, 28(2): 92-97.
[15] Udhyan Timilsina, Leah Riungu-Kalliosaari, Ossi Taipale, Kari Smolander, Wang Weijun. Security Issues on Testing of Public Cloud Applications[J]. 现代图书情报技术, 2012, (11): 22-33.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn