INTEGRITY CONSTRAINT BASIS DATA RELASIONAL DENGAN MENGGUNAKAN PL/PGSQL DAN CHECK CONSTRAINT
Abstract
Full Text:
PDFReferences
HALFOND, W., VIEGAS, J., AND ORSO, A. 2006. A classification of sql-injection attacks and countermeasures. In Proceedings of the IEEE International Symposium on Secure Software Engineering. IEEE, 65–81.
MELTON, J. AND SIMON, A. 1993. Understanding the New SQL: A Complete Guide. The Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann Publishers.
RAHARJO, S. 2012. Cosntranit Basis Data sebagai Fondasi yang Kuat Dalam Pengembangan Sistem Informasi, Seminar Nasional Aplikasi Sains & Teknologi (SNAST) Periode III ISSN: 1979-911X Yogyakarta, 3 November 2012 (SNAST 2012).
RAHARJO, S., SUTANTA , E., AND UTAMI , E. 2007. Analisis aspek-aspek kualitas schema database (studi kasus pada database akademik ista yogyakarta). Seminar Nasional Teknologi 2007 (SNT 2007).
ROB, P. AND CORONEL , C. 2009. Database Systems: Design, Implementation, and Management. Course Technology.
SCHOLTE , T., BALZAROTTI , D., AND KIRDA , E. 2012. Quo vadis? a study of the evolution of input validation vulnerabilities in web applications. Financial Cryptography and Data Security, 284–298.
Refbacks
- There are currently no refbacks.