Datenbanken Management
Database Management Systems
Database security has to follow the standard format of Authentication, Authorisation, and Auditing. Any failure in any of the three parts is considered a total failure. There is another level of security that needs to be addressed, which is covered in this Section of the Report; this is data encryption. Data encryption is vital in terms of security, but the I/O impact that blanket encryption can have is so enormous as to make having a sensible encryption strategy a prime requisite.
Although database technology is considered mature (especially in the relational field), there are new techniques being introduced. In the area of indexing (Section 3.3.4) a detailed review of a technique known as Adaptive Addressing from a company called CopperEye is included. This new indexing has both an open solution and a specific solution for OracleOracle, and promises to set new standards in this area. Alles zu Oracle auf CIO.de
Overall, this Report can be used to look at both the physical and the logical elements of databases, their uses, their strengths, and their weaknesses. The Report can also be used as a jumping-off point for understanding the need to incorporate database management with data management, and bring the whole data structure under single control.
Der vollständige Bericht kann bei der Butler Group bestellt werden.