Securing database with command line linux: Difference between revisions
From ICO wiki
Jump to navigationJump to search
Line 2: | Line 2: | ||
==Aim of this page== | ==Aim of this page== | ||
To secure the data base using the command line method | *To secure the data base using the command line method |
Revision as of 20:08, 13 March 2016
General Information about command line
Aim of this page
- To secure the data base using the command line method