G'day Sarah,
Pater Wayner has apparently written a book on the subject of how to store and use information in a database that will be of limited use to attackers. His website is below, with an oreilly article describing the book. Haven't read it myself yet.
http://www.wayner.org/books/td/ http://www.oreillynet.com/pub/a/network/2002/08/02/simson.html
uru
-Dave
Sarah Tanembaum wrote:
Here's my question:
a) How can I make sure that it secure so only authorized person can modify/add/delete the information? Beside transaction logs, are there any other method to trace any transaction(kind of paper trail)?
-- MySQL General Mailing List For list archives: http://lists.mysql.com/mysql To unsubscribe: http://lists.mysql.com/[EMAIL PROTECTED]