Useful Links
Computer Science
Databases
Database Management Systems
1. Introduction to Databases and DBMS
2. Data Models
3. The Relational Model
4. Database Design
5. SQL (Structured Query Language)
6. Storage and File Structure
7. Query Processing and Optimization
8. Transaction Management
9. Recovery Systems
10. Database Security
11. Distributed Database Systems
12. NoSQL Database Systems
13. Data Warehousing and OLAP
14. Emerging Database Technologies
Database Security
Security Threats and Vulnerabilities
External Threats
Unauthorized Access
Data Breaches
Network Attacks
Internal Threats
Insider Threats
Privilege Abuse
Application-Level Threats
SQL Injection
Cross-Site Scripting
Buffer Overflow
Access Control Models
Discretionary Access Control
Access Control Lists
Capability Lists
Mandatory Access Control
Security Labels
Security Policies
Role-Based Access Control
Role Hierarchies
Role Assignment
Permission Assignment
Attribute-Based Access Control
Authentication and Authorization
Authentication Methods
Password-Based Authentication
Multi-Factor Authentication
Biometric Authentication
Certificate-Based Authentication
Authorization Mechanisms
Privilege Management
Grant and Revoke Operations
Privilege Propagation
Database Encryption
Encryption Concepts
Symmetric Encryption
Asymmetric Encryption
Key Management
Data-at-Rest Encryption
Transparent Data Encryption
Column-Level Encryption
Tablespace Encryption
Data-in-Transit Encryption
SSL/TLS Protocols
Network Encryption
Key Management Systems
SQL Injection Prevention
Input Validation
Parameterized Queries
Stored Procedures
Least Privilege Principle
Database Auditing
Audit Trail Generation
Audit Log Management
Compliance Monitoring
Forensic Analysis
Privacy and Data Protection
Data Anonymization
Data Masking
Privacy-Preserving Techniques
Regulatory Compliance
Previous
9. Recovery Systems
Go to top
Next
11. Distributed Database Systems