Best Practices to Protect Databases behind RDBMS-Powered Web Applications

N/A

Saved in:
Bibliographic Details
Main Author: Haraty, Ramzi A. (author)
Other Authors: Hammoud, Ahmad (author)
Format: conferenceObject
Published: 2018
Online Access:http://hdl.handle.net/10725/7023
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513481367093248
author Haraty, Ramzi A.
author2 Hammoud, Ahmad
author2_role author
author_facet Haraty, Ramzi A.
Hammoud, Ahmad
author_role author
dc.creator.none.fl_str_mv Haraty, Ramzi A.
Hammoud, Ahmad
dc.date.none.fl_str_mv 2018-02-05T10:35:49Z
2018-02-05T10:35:49Z
2018-02-05
dc.identifier.none.fl_str_mv http://hdl.handle.net/10725/7023
Hammoud, A., & Haraty, R. A. Best Practices to Protect Databases behind RDBMS-Powered Web Applications.
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdf
dc.language.none.fl_str_mv en
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.title.none.fl_str_mv Best Practices to Protect Databases behind RDBMS-Powered Web Applications
dc.type.none.fl_str_mv Conference Paper / Proceeding
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/conferenceObject
description N/A
eu_rights_str_mv openAccess
format conferenceObject
id LAURepo_e50a2d355ef5e8b5a051b635512b7c4e
identifier_str_mv Hammoud, A., & Haraty, R. A. Best Practices to Protect Databases behind RDBMS-Powered Web Applications.
language_invalid_str_mv en
network_acronym_str LAURepo
network_name_str Lebanese American University repository
oai_identifier_str oai:laur.lau.edu.lb:10725/7023
publishDate 2018
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Best Practices to Protect Databases behind RDBMS-Powered Web ApplicationsHaraty, Ramzi A.Hammoud, AhmadN/A2018-02-05T10:35:49Z2018-02-05T10:35:49Z2018-02-05Conference Paper / Proceedinginfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/conferenceObjecthttp://hdl.handle.net/10725/7023Hammoud, A., & Haraty, R. A. Best Practices to Protect Databases behind RDBMS-Powered Web Applications.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttp://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdfeninfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/70232021-03-19T10:43:15Z
spellingShingle Best Practices to Protect Databases behind RDBMS-Powered Web Applications
Haraty, Ramzi A.
status_str publishedVersion
title Best Practices to Protect Databases behind RDBMS-Powered Web Applications
title_full Best Practices to Protect Databases behind RDBMS-Powered Web Applications
title_fullStr Best Practices to Protect Databases behind RDBMS-Powered Web Applications
title_full_unstemmed Best Practices to Protect Databases behind RDBMS-Powered Web Applications
title_short Best Practices to Protect Databases behind RDBMS-Powered Web Applications
title_sort Best Practices to Protect Databases behind RDBMS-Powered Web Applications
url http://hdl.handle.net/10725/7023
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://csm.beirut.lau.edu.lb/~rharaty/pdf/IC19.pdf