Best Practices to Protect Databases behind RDBMS-Powered Web Applications
N/A
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | conferenceObject |
| Published: |
2018
|
| Online Access: | http://hdl.handle.net/10725/7023 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1864513481367093248 |
|---|---|
| author | Haraty, Ramzi A. |
| author2 | Hammoud, Ahmad |
| author2_role | author |
| author_facet | Haraty, Ramzi A. Hammoud, Ahmad |
| author_role | author |
| dc.creator.none.fl_str_mv | Haraty, Ramzi A. Hammoud, Ahmad |
| dc.date.none.fl_str_mv | 2018-02-05T10:35:49Z 2018-02-05T10:35:49Z 2018-02-05 |
| dc.identifier.none.fl_str_mv | http://hdl.handle.net/10725/7023 Hammoud, A., & Haraty, R. A. Best Practices to Protect Databases behind RDBMS-Powered Web Applications. http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdf |
| dc.language.none.fl_str_mv | en |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.title.none.fl_str_mv | Best Practices to Protect Databases behind RDBMS-Powered Web Applications |
| dc.type.none.fl_str_mv | Conference Paper / Proceeding info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/conferenceObject |
| description | N/A |
| eu_rights_str_mv | openAccess |
| format | conferenceObject |
| id | LAURepo_e50a2d355ef5e8b5a051b635512b7c4e |
| identifier_str_mv | Hammoud, A., & Haraty, R. A. Best Practices to Protect Databases behind RDBMS-Powered Web Applications. |
| language_invalid_str_mv | en |
| network_acronym_str | LAURepo |
| network_name_str | Lebanese American University repository |
| oai_identifier_str | oai:laur.lau.edu.lb:10725/7023 |
| publishDate | 2018 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | Best Practices to Protect Databases behind RDBMS-Powered Web ApplicationsHaraty, Ramzi A.Hammoud, AhmadN/A2018-02-05T10:35:49Z2018-02-05T10:35:49Z2018-02-05Conference Paper / Proceedinginfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObjecthttp://hdl.handle.net/10725/7023Hammoud, A., & Haraty, R. A. Best Practices to Protect Databases behind RDBMS-Powered Web Applications.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttp://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdfeninfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/70232021-03-19T10:43:15Z |
| spellingShingle | Best Practices to Protect Databases behind RDBMS-Powered Web Applications Haraty, Ramzi A. |
| status_str | publishedVersion |
| title | Best Practices to Protect Databases behind RDBMS-Powered Web Applications |
| title_full | Best Practices to Protect Databases behind RDBMS-Powered Web Applications |
| title_fullStr | Best Practices to Protect Databases behind RDBMS-Powered Web Applications |
| title_full_unstemmed | Best Practices to Protect Databases behind RDBMS-Powered Web Applications |
| title_short | Best Practices to Protect Databases behind RDBMS-Powered Web Applications |
| title_sort | Best Practices to Protect Databases behind RDBMS-Powered Web Applications |
| url | http://hdl.handle.net/10725/7023 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdf |