Please wait a minute...
New Technology of Library and Information Service  2004, Vol. 20 Issue (6): 85-89    DOI: 10.11925/infotech.1003-3513.2004.06.23
Current Issue | Archive | Adv Search |
Research of SQL Server Database Security Management
Wang Zhanghong
(Library of Chongqing University, Chongqing 400044, China)
Download:
Export: BibTeX | EndNote (RIS)      
Abstract  

This paper introduce the method of building SQL Server database security control strategy,the method of database backup by using SQL Server enterprise manager or application program,and the method of database restore.

Key wordsSQL Server      Database      Security      Backup     
Received: 19 January 2004      Published: 25 June 2004
ZTFLH: 

TP311.11

 
Corresponding Authors: Wang Zhanghong     E-mail: fastzhwang@263.net
About author:: Wang Zhanghong

Cite this article:

Wang Zhanghong. Research of SQL Server Database Security Management. New Technology of Library and Information Service, 2004, 20(6): 85-89.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2004.06.23     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2004/V20/I6/85

[1] Li Xiao, Qu Jiansheng. Review of Application and Evolution of Meta-Analysis in Social Sciences[J]. 数据分析与知识发现, 2021, 5(11): 1-12.
[2] Zeng Zhen,Li Gang,Mao Jin,Chen Jinghao. Data Governance and Domain Ontology of Regional Public Security[J]. 数据分析与知识发现, 2020, 4(9): 41-55.
[3] Shen Zhe, Wang Yi, Yao Yifan, Cheng Ying. Author Name Disambiguation Techniques for Academic Literature: A Review[J]. 数据分析与知识发现, 2020, 4(8): 15-27.
[4] Shen Zhihong,Zhao Zihao,Wang Haibo. Big Data Technology Stack Shifting: From SQL Centric to Graph Centric[J]. 数据分析与知识发现, 2020, 4(7): 50-65.
[5] Feng Wengang,Jiang Zhaofeifan. Improving Security Checks and Passenger Risk Evaluation with Classification of Airline Passengers[J]. 数据分析与知识发现, 2020, 4(12): 105-119.
[6] Lianjie Xiao,Tao Meng,Wei Wang,Zhixiang Wu. Entity Recognition of Intelligence Method Based on Deep Learning: Taking Area of Security Intelligence for Example[J]. 数据分析与知识发现, 2019, 3(10): 20-28.
[7] Sun Haixia,Wang Lei,Wu Yingjie,Hua Weina,Li Junlian. Matching Strategies for Institution Names in Literature Database[J]. 数据分析与知识发现, 2018, 2(8): 88-97.
[8] Jia Longjia,Zhang Bangzuo. Classifying Topics of Internet Public Opinion from College Students: Case Study of Sina Weibo[J]. 数据分析与知识发现, 2018, 2(7): 55-62.
[9] Zhu Guang,Feng Mining,Zhang Weiwei. Incentive Investments on Information Security for Libraries: An Evolutionary Game-theory Approach[J]. 数据分析与知识发现, 2018, 2(6): 13-24.
[10] Feng Wen’gang,Li Yan,Li Fuhai,Wang Xin,Zhou Xiping. Risk Assessment and Decision Analysis of Civil Aviation Security with Risk Ranking and Decision Tree[J]. 数据分析与知识发现, 2018, 2(10): 27-36.
[11] Feng Wengang,Huang Jing. Early Warning for Civil Aviation Security Checks Based on Deep Learning[J]. 数据分析与知识发现, 2018, 2(10): 46-53.
[12] Dongsheng Zhai, He Liu, Jie Zhang, Liwei Cai. Managing Patent Semantic Knowledge with Graph Database[J]. 数据分析与知识发现, 2016, 32(12): 66-75.
[13] Gao Guangshang, Zhang Zhixiong. Survey on Entity Resolution over Relational Databases[J]. 现代图书情报技术, 2015, 31(7-8): 37-47.
[14] Hao Hui. A Duplicate Removal Algorithm of Cross-database Search Based on Sci-tech Novelty Retrieval[J]. 现代图书情报技术, 2015, 31(1): 89-95.
[15] Xiong Yongjun, Yuan Xiaoyi. Design and Implementation of Automatic Monitoring System about Library Document Database Running State[J]. 现代图书情报技术, 2014, 30(7): 127-132.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn