Securing database with command line linux: Difference between revisions

From ICO wiki
Jump to navigationJump to search
Line 2: Line 2:


==Aim of this page==
==Aim of this page==
To secure the data base using the command line method
*To secure the data base using the command line method

Revision as of 20:08, 13 March 2016

General Information about command line

Aim of this page

  • To secure the data base using the command line method