
handle: 11056/25419
Existe una constante preocupación por la seguridad de las bases de datos; muchas veces la seguridad se ve afectada por la configuración de los procesos de conexión. En este ensayo se estudia como se configuran las conexiones hacia una base de datos, explicando los posibles errores y se proporcionan recomendaciones para disminuir el riesgo asociado a estos procesos.
Exist a constant worry for Database Security, many times the security is affected for the security configuration connection, this paper will study how make security connection to a Database, explaining common mistakes and to give recommendations for keep low the associated risk to these process.
Universidad Nacional, Costa Rica
Escuela de Informática
SECURITY, TECNOLOGÍA, Q1-390, Science (General), DATABASE, Science, BASES DE DATOS, Q, SEGURIDAD, INFORMACIÓN, Bases de datos, seguridad
SECURITY, TECNOLOGÍA, Q1-390, Science (General), DATABASE, Science, BASES DE DATOS, Q, SEGURIDAD, INFORMACIÓN, Bases de datos, seguridad
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
