G'day Sarah,

Pater Wayner has apparently written a book on the subject of how to store and use information in a database that will be of limited use to attackers. His website is below, with an oreilly article describing the book. Haven't read it myself yet.

http://www.wayner.org/books/td/
http://www.oreillynet.com/pub/a/network/2002/08/02/simson.html

uru

-Dave

Sarah Tanembaum wrote:
Here's my question:

a) How can I make sure that it secure so only authorized person can
modify/add/delete the information? Beside transaction logs, are there
any
other method to trace any transaction(kind of paper trail)?

-- MySQL General Mailing List For list archives: http://lists.mysql.com/mysql To unsubscribe: http://lists.mysql.com/[EMAIL PROTECTED]



Reply via email to