Redundancy is controlled.

Unauthorised access is restricted.

Providing multiple user interfaces.

Enforcing integrity constraints.

Providing backup and recovery.


Like it on Facebook, Tweet it or share this article on other bookmarking websites.

No comments