What data tables or transactions would you want to monitor on a regular basis to help indicate if a crime or attack is begin committed against the system?
Devise a security plan for Rolling Thunder Bicycles. Identify the various classes of users and determine the level of access required by each group. Create any queries necessary to provide the desired security.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here