intTypePromotion=1
ADSENSE

Pen Testing Databases by Michael T. Raggo, CISSP, NSA-IAM, CCSI, SCSA, CSI

Chia sẻ: Fhh Fhf | Ngày: | Loại File: PDF | Số trang:71

34
lượt xem
3
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

There are many changes to this chapter from the 3 edition. 1NF is now defined formally. Functional dependencies are now covered in this chapter, instead of Chap- ter 6. The reason is that normalization provides the real motivation for functional dependencies, since they are used primarily for normalization. We have described a simplified procedure for functional dependency inference based on attribute closure, and provided simplified procedures to test for normal forms. Coverage of multivalued dependency theory and normal forms beyond 4NF (that is, PJNF and DKNF) has been moved into Appendix C (which is available on the web, not in the print form of the book). The process of practical...

Chủ đề:
Lưu

Nội dung Text: Pen Testing Databases by Michael T. Raggo, CISSP, NSA-IAM, CCSI, SCSA, CSI

ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2