Securing database with command line linux: Difference between revisions
From ICO wiki
Jump to navigationJump to search
| Line 2: | Line 2: | ||
==Aim of this page== | ==Aim of this page== | ||
To secure the data base using the command line method | *To secure the data base using the command line method | ||
Revision as of 20:08, 13 March 2016
General Information about command line
Aim of this page
- To secure the data base using the command line method