|
This course shows learners how to control access to data and how to create a database. It also provides best practices for safeguarding data.
Objectives:
- Use authentication types to determine where and how user identities are verified
- Modify the authentication level for an instance
- Grant database access authorities and privileges
- Decide what data to store in the database
- Define relationships between tables
- Identify constraints and foreign keys
Topics:
- Types of authentication
- Access to DB2
- Access within DB2
- Security for Windows
- Deciding what to store in the database
- Defining relationships, keys, and constraints for a table
- Normalizing the table
- Creating a simple database
- Adding data to tables
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|