computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 39
Chapter 39 –  Application Controls
     Myles Walsh

Chapter Contents:

   39.1    Protection in Development
   39.2    Protecting Online Files
   39.2.1    Types of Data Corruption
   39.2.2    Database Management Subsystem
   39.2.2.1    Referential Integrity
   39.2.2.2    Uniqueness Constraints
   39.2.3    Lock on Update
   39.2.3.1    Unconditional Versus Conditional Locking
   39.2.3.2    Deadlocks
   39.2.4    Two-Phase Commit
   39.2.5    Backup Files and System Logs
   39.2.6    Recovery and Restart
   39.2.7    Backout
   39.2.8    Roll-Forward Recovery
   39.2.9    Distributed Databases
   39.3    Protecting Batch Files
   39.3.1    Backup File Creation
   39.3.2    Audit Controls
   39.4    Assuring that Information in the System is Valid
   39.4.1    Validation Controls
   39.4.1.1    Methods for Identifying Input Errors and Unauthorized Modifications
   39.4.1.2    Range Checks
   39.4.1.3    Validity Checks Using Tables
   39.4.2    Diagnostic Utilities
   39.5    Conclusion
   39.6    For Further Reading

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved