CHAPTER 52
APPLICATION CONTROLS
Myles Walsh
52.1 PROTECTION IN APPLICATION DEVELOPMENT
52.2.1 Types of Data Corruption
52.2.2 Database Management Subsystems
52.2.5 Backup Files and System Logs
52.4 ENSURING THAT INFORMATION IN THE SYSTEM IS VALID
52.1 PROTECTION IN APPLICATION DEVELOPMENT.
In computer installations where systems development takes place, there are technologies that tend to enhance security. These technologies, together with mandatory organizational procedures and standards, force analysts and programmers to adhere to guidelines when they are developing in-house applications or systems to be marketed. This chapter reviews some of the methods programmers use to prevent and identify problems involving data corruption or unavailability.
One of the underpinnings of modern programming is the technology known as the database management system (DBMS). Many applications are developed using this technology. A contemporary RDBMS supports relational databases. Relational databases themselves are based on an underlying technology developed in the 1960s and implemented through the remainder of the twentieth century. It ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.