Which security technique limits access by unauthorized users to parts of an enterprise database?
A.
Views
B.
Concurrency
C.
Locking
D.
Integrity controls
Which security technique limits access by unauthorized users to parts of an enterprise database?
Which security technique limits access by unauthorized users to parts of an enterprise database?
A.
Views
B.
Concurrency
C.
Locking
D.
Integrity controls