نتایج جستجو برای: sql server

تعداد نتایج: 65730  

Journal: :IEEE Access 2021

Database forensics is becoming more important for investigators with the increased use of information system. Although various database forensic methods such as log analysis and investigation model development have been studied, among methods, recovering deleted data a key technique in DB tampering anti-forensics. Previous studies mainly focused on transaction or journal to recover data, but if...

ژورنال: پیاورد سلامت 2019
ادبی, خدیجه, شاهمرادی, لیلا, صفدری, رضا, طهماسبیان, شهرام, مهدوی, سمیه, نظری, مهناز,

Background and Aim: To provide effective care, health care providers need timely and appropriate information. Electronic records provide quick access and easy management of data. The aim of this study was to develop electronic health records for patients with hydatidiform mole and evaluation of completeness of medical records Materials and Methods: This applied study was conducted in 2017. Aft...

2000
Linchi Shea

Monitoring a large number of SQL Servers in an enterprise is a difficult task. The SQL Server administrators have to deal with a large amount of very dynamic and diverse information, and many other complicating factors. We found that the age-old principle of management by exception provides an effective framework in organizing our monitoring efforts. This paper describes our experience in using...

2006
Witold Litwin Soror Sahri Thomas J. E. Schwarz

We present a scalable distributed database system called SD-SQL Server. Its original feature is dynamic and transparent repartitioning of growing tables, avoiding the cumbersome manual repartitioning that characterize current technology. SD-SQL Server re-partitions a table when an insert overflows existing segments. With the comfort of a single node SQL Server user, the SDSQL Server user has la...

2014
Bojken Shehu Aleksander Xhuvani

In this paper, we present a detailed discussion on different SQL injection attacks and their prevention technique. In addition, we proposed a new scheme for prevention of SQL injection attack, which consist of three blocks or three tier architecture: the clients, the application server and the database server. Our protective layer works between the clients and application server. Therefore, bef...

سمیه دوج علی اصغر آل شیخ

مقاله حاضر به بررسی رفتاری پایگاه اطلاعات مکانی-زمانی می پردازد. اهداف این مقاله عبارتند از: تعیین پارامترها و ارزیا بی سیستم های مدیریت پایگاه داده موجود، و توسعه سیستم بهینه به نحوی که مدل سازی و مدیریت اشیائ متحرک در آن صورت پذیرد. بیش از سی و پنج مشخصه جهت تعیین نرم افزار بهینه تعیین و پنج سیستم Oracle10g, DB2, MS SQL Server, MySQL, and Postgre SQL بر اساس آنها ارزیابی شدند. مروری بر مدله...

2016
Teresa K. George Rekha James Sajjan G. Shiva Tanmoy Sarkar Bruce W. Weide Darren Mutz

SQL injection attacks are often found within the dynamic pages of a web application that exploit the security vulnerability of the database layers of an application. In this attack category a specifically crafted SQL command is entered in the form field of a web application instead of the expected information. SQL injection takes advantages of the design flaws in poorly designed web application...

2008
Soror Sahri Witold Litwin Thomas J. E. Schwarz

SD-SQL Server is a scalable distributed database system. Its original feature is dynamic and transparent repartitioning of growing tables. It avoids the cumbersome manual repartitioning necessary with current technology. SD-SQL Server re-partitions a (distributed) table when an insert overflows existing segments. To its user, SD_SQL offers the comfort of a single node, while allowing the larger...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید