The document discusses the role of database systems in government sectors and anti-terrorism. It begins by defining databases and database management systems (DBMS), describing their functions and advantages. These include centralized data storage, data consistency, integration and sharing. The document then provides examples of database usage in areas like health, security, education and traffic management. Finally, it proposes ways for the new Syrian government to use databases in counter-terrorism, such as designing databases to store suspect information and using database triggers to detect suspicious activity.
IT-Centric Disaster Recovery & Business ContinuitySteve Susina
This presentation was delivered to the Business Resumption Planners Association of Chicago meeting on 3/11/2010.
IT leaders who assume responsibility for their firm's DR/BC efforts need to understand how to build a cross-organization strategy that transcends IT organizational boundaries. In the presentation, we discuss the need for IT leaders to reach across the aisles to work with Line-of-Business leaders, and present a six-step framework on how to accomplish a cross-business IT-centric strategy.
Data Modeling and Database Design 2nd Edition by Umanath Scamell Solution Manualendokayle
link full download: https://testbankstudy.com/product/data-modeling-and-database-design-2nd-edition-by-umanath-scamell-solution-manual/
Language: English
ISBN-10: 1285085256
ISBN-13: 978-1285085258
ISBN-13: 9781285085258
Difference between File system And DBMS.pptxShayanMujahid2
In this presentation the difference between the file system and database management, and why databases are preferable. Not only is a database more reliable and secure than a file system, but it also allows you to modify the data easily.
The term malware refers to software designed to intentionally damage a computer, a server, a client or a computer network. Alternatively, a software defect happens when a faulty component leads to unintentional harm.
IT-Centric Disaster Recovery & Business ContinuitySteve Susina
This presentation was delivered to the Business Resumption Planners Association of Chicago meeting on 3/11/2010.
IT leaders who assume responsibility for their firm's DR/BC efforts need to understand how to build a cross-organization strategy that transcends IT organizational boundaries. In the presentation, we discuss the need for IT leaders to reach across the aisles to work with Line-of-Business leaders, and present a six-step framework on how to accomplish a cross-business IT-centric strategy.
Data Modeling and Database Design 2nd Edition by Umanath Scamell Solution Manualendokayle
link full download: https://testbankstudy.com/product/data-modeling-and-database-design-2nd-edition-by-umanath-scamell-solution-manual/
Language: English
ISBN-10: 1285085256
ISBN-13: 978-1285085258
ISBN-13: 9781285085258
Difference between File system And DBMS.pptxShayanMujahid2
In this presentation the difference between the file system and database management, and why databases are preferable. Not only is a database more reliable and secure than a file system, but it also allows you to modify the data easily.
The term malware refers to software designed to intentionally damage a computer, a server, a client or a computer network. Alternatively, a software defect happens when a faulty component leads to unintentional harm.
We presented a list of capabilities that should be provided by the DB.pdfarchanacomputers1
We presented a list of capabilities that should be provided by the DBMS software to the DBA,
database designers, and end users to help them design, administer, and use a database. Then we
gave a brief historical perspective on the evolution of database applications. We pointed out the
recent rapid growth of the amounts and types of data that must be stored in databases, and we
discussed the emergence of new systems for handling \"big data\" applications. Finally, we
discussed the overhead costs of using a DBMS and discussed some situations in which it may not
be advantageous to use one. Define the following terms: data, database, DBMS, database
system, database catalog, program-data independence, user view, DBA, end user, canned
transaction, deductive database system, persistent object, meta-data, and transaction-processing
application. What four main types of actions involve databases? Briefly discuss each. Discuss
the main characteristics of the database approach and how it differs from traditional file systems.
What are the responsibilities of the DBA and the database designers? What are the different
types of database end users? Discuss the main activities of each. Discuss the capabilities that
should be provided by a DBMS. Discuss the differences between database systems and
information retrieval systems. Identify some informal queries and update operations that you
would expect to apply to the database shown in Figure 1.2. What is the difference between
controlled and uncontrolled redundancy? Illustrate with examples. Specify all the relationships
among the records of the database shown in Figure 1.2.
Solution
I.
Data: data is simply called as collection of objects.
Data base : data base is collection of information which is organised in so the information can be
accessed very easily.
Data base Management System: it is a computer software. it creates and manages database.it also
capture and analyses the data.
Data base System : it is a highlevel definition which relates the structure and relationship
between stored data.
Database catalog : database catalog consists of tables, views, synonyms, value ranges, indexes,
users, and user groups are stored.
program data independence: Data independence is the type of data transparency that matters for a
DBMS.
User View: It is some set screens which appears for a user to select a certain actiomn or option.
DBA: DBA refers to data base adminstrator he controls all the action with respect to data base.
End User: end user is a person he will use the product after it is developed fully.
Canned Transaction : It is a standard type of query and updates that have been carefully
programmed and tested.
deductive database: A deductive database is a database system that can make deductions (i.e.,
conclude additional facts) based on rules and facts.
Persistent objects: These are the fundamental logical units of data storage in a database.
Meta data: meta data is a data which provides the information of other .
Proactive steps to ensure the success of the next ERP project.
The main goal of this presentation is to provide learned lessons and project recommendations
by assessing the failure of Avon order managementsystem project from an IT projectmanagement perspective
Organizations can establish a consistent method for determining if projects are having an adverse impact on the IT portfolio, are failing and need to be shut down.
Specific criteria and data to be collected and analyzed may include the following:
It is of no secret that the technological constant developments have affected many aspects of human lives within the last decades.
Managing people in a co-located team differ than a distributed team; the traditional co-located teams require depth understanding for the dynamics of human and social grouping, while dealing with virtual teams has created additional difficulties for management.
In the distributed teams, the spirit of collaboration is harder to be achieved, and the interaction between team members becomes less visible, which definitely would affect achieving the organization objective and the managerial process effectiveness.
Virtual collaboration enables distributed expertise to focus on shared problems with a necessary interfacing through technology.
Quality of interaction is critical for establishing the framework for successful collaboration on any team, virtual or not; however, the usual hurdles of any group of people coming together to tackle difficult problems is exacerbated in virtual groups by having to rely on technology.
For this reason, virtual collaboration should be planned for and supported by the development of specific interaction skills and the technological proficiency that will help ensure project success.
There continues to be a need to understand how technology changes the nature of work and collaboration.
Because of Geographical distance, the biggest challenge that faced the project / program manager is managing a virtual team.
In the following papers, I will shine the light on some tools, techniques, and useful Idea to managing virtual projects.
The main goal of this presentation is to draw the roadmap of the methodology of implementing the Knowledge Management at the HCL’s prospective customersTaking advantage of longexperience and HCL developed KM tools .
While the main processes of knowledge management is a challenge in the organizations, it must be some technical tools to help organization to enhance their service and create competitive advantage.
In the following papers, I will explore some tools and social Medias that influence the Knowledge Management in the organizations.
Effectiveness of knowledge management depends on how knowledge management process are aligned with an organizations infrastructure and processes that supports the achievement of organizations goals. To understand and represent relationships a simple list of elements and process is scanty, we need a holistic framework where all are integrated into a dynamic framework. The proposed framework is particularly focused on dividing the identified organizational building blocks into their constituent elements along both time and content dimensions to define characteristics of these elements, and it also define the relationships between the organizations to form a social ecology in which people effectively create share and use knowledge in business management. In this way, the developed framework can assist management to understand the true nature of the relationship that exist between an organization and knowledge management process, and exploit them for an organizations success.
The Alexandria Hospital is a small public hospital found in the Midwestern part of Singapore. The hospital that was established as a British Military Hospital in 1938 and after serving for thirty-three years was handed to the Singapore government by the British administration and renamed to Alexandria Hospital.
The hospital has undertaken many initiatives to upgrade its major facilities to serve the patients better. It began rethink how to enhance patient services via the exploitation of technology.
The decision was to implement the Clinical Digital Dashboard (CDD) and the Clinical Connection Suite (CCS).
Although they were pressured from the Health Minister challenge to form a health care center that provides continuous focus on patients, But the main objectives of implementing these system were to include all patient's issues in one database to improve the hospital operation and delivering a seamless, safe, and patient centric health care...
GFS Crane from GreenField Software provides a complete range of DCIM capabilities: data center modeling, facilities and IT infrastructure monitoring, provisioning, capacity planning, asset management, energy efficiency and sustainability reporting.
GFS Crane is an ERP for Data Centers, allocating and optimizing key resources – power, space, cooling and networks.
The software from India-based GreenField Software helps data centers control capital costs, reduce operating expenses, and mitigate the risks of data center failures.
Green IT should be a big part of any enterprise sustainability strategy with a strong focus on reducing energy usage.
Business leaders look for ways to reduce costs by minimizing energy usage, carbon emissions and waste. Technology can play a big part in providing the solutions.
IT Projects are typically complex undertakings where requirements, and their gathering from often multiple stakeholders, can often be difficult. The practice of Quality Management during the course of IT Projects should, in theory, lead to better governance and overall outcomes. This paper explores four individual IT Projects and details the methods of qualification gathering, stakeholder engagement and overall Quality Management employed. Following this is a review of the common themes found in each project and a discussion on their application from a Quality Management perspective.
The content:
The Challenge Today IN Oil & Gas Industry.
Supply Chain link in the oil and gas industry
Oil & Gas business process issues.
Factors that erodes customer and shareholder value
The suggested solutions
Conclusion
References
A prototype of adopting the Internet Of Things (IoT) in Dairy Farms.
This prototype was prepared to practicing in PROTOTYPE CHALLENGE of course " TOUCH IOT WITH SAP LEONARDO"
The Idea and prototype prepared by:
Monzer Osama
IoT@MonzerOsama.com
05/07/2017
The overview about some challenges in construction industry.
How to Improve project outcomes using Microsoft Project Online
How to enable team involvement and Boost collaboration.
How to make smarter decisions using the Business intelligent tools.
The main goal of this presentation is to study three large information systems projects that failed over the last five years and identify the reasons of failure and derive the challenges and recommendations for IS strategists.
The main goal of this presentation is to delivering recommendations on Infosys’s IS strategy,
Considering the Design Thinking as a Strategy for Innovation within Infosys.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
The Databases applications in government sections
1. ANAG THE DIGITAL FIRM
January 22, 2013
Prepared By:
Monzer Osama AL-Shaikh Warak
Under supervision of Dr. Wing Lam
The Databases applications in government
sections
THE ROLE OF DATABASE SYSTEM IN ANTI-TERRORIST
2. 1
TheDatabasesapplicationsingovernmentsections|1/22/2013
Contents
OBJECTIVE ......................................................................................................................2
INTRODUCTION ...............................................................................................................2
SECTION ONE: THE DATABASE CONCEPT. ........................................................................................3
1. WHAT IS THE DATABASE? .................................................................................................3
2. DATABASE MANAGEMENT SYSTEM (DBMS)..............................................................................3
2.1 FUNCTIONS OF DBMS .....................................................................................................4
2.2 ADVANTAGE OF DBMS....................................................................................................4
3. POPULAR RDBMS ...........................................................................................................5
4. DATABASE SECURITY.......................................................................................................5
4.1 ACCESS CONTROL .............................................................................................6
4.2 PASSWORD MANAGEMENT ...................................................................................6
4.3 AUDITING .......................................................................................................7
4.4 DATABASE VULNERABILITY ...................................................................................7
5. DATABASE ENCRYPTION...................................................................................................7
6. DATA WAREHOUSE ........................................................................................................8
6.1 DATA WAREHOUSING FUNDAMENTALS.....................................................................9
6.2. OLTP AND OLAP ..............................................................................................9
6.3. DATA FLOW ...................................................................................................9
6.4. DATA MINING .................................................................................................9
6.5 DECISION MAKING USING A DATA WAREHOUSING ...................................................... 10
6.6 DATA WAREHOUSE MODELS ............................................................................... 10
7. BIOMETRIC DATABASE AND ITS USES................................................................................... 11
8. THE DATABASE BACKUP & RESTORE METHODOLOGIES AND CONCEPT.......................................... 12
8.1 BASIC CONCEPTS: ........................................................................................... 12
SECTION 2: DATABASE'S USAGE IN THE GOVERNMENT SECTORS ..................................................13
TECHNOLOGY IS CHANGING OUR LIVES AT AN UNPRECEDENTED PACE. THESE DAYS, ANY GOVERNMENT NOT
TRANSFORMED INTO THE TECHNOLOGY WILL CONSIDERED AS AN OUTDATED GOVERNMENT! ... 13
SECTION 3:THE ROLE OF DATABASE SYSTEM IN ANTI-TERRORIST .................................................15
9.1 HOW CAN THE NEW SYRIAN GOVERNMENT TAKE ADVANTAGE OF THE DATABASE SYSTEMS TO PROTECT
COUNTRY?.................................................................................................................. 16
9.1.1 DESIGN THE DATABASE: .................................................................................. 16
9.1.2. DATABASE TRIGGERS .................................................................................... 21
9.1.3. CARTER CENTER'S EXPERIENCE: USING TECHNOLOGY TO MAP CONFLICT IN SYRIA............ 22
CONCLUSION................................................................................................................. 22
REFERENCES.................................................................................................................. 23
3. 2
TheDatabasesapplicationsingovernmentsections|1/22/2013
Objective
The main objective of this paper is to introduce the power of the database management
systems and to shine the light on databases’ technologies that may use in governments
sections (Health, Security, Educations, Traffic management etc.) as well as describe the
ways on how can the new Syrian's government take advantage of DBMS's role in anti-
terrorist.
Introduction
As a result of increased public awareness of the importance of information in all areas of
life led to finding ways to store, retrieve and manipulate data, which is known as a
databases.
Through this it would be possible to find the results and decision-making in order to
develop business systems using data and classified according to the characteristics and
nature of the work.
The database also provides measurement of maintain the security and data privacy.
Effectiveness of database management systems in the government sector are depends on
how to select the right solution that aligned with the government infrastructure and
processes that supports the achievement of government goals.
The structure of this paper is as follows:
In the First section:
I will describe the concept of the database and related technologies
In the second section:
I will explore some real-life examples on the database's usage in government sectors.
The last section of this paper I will be more detailed on how we could use the database
management system in anti-terrorist.
4. 3
TheDatabasesapplicationsingovernmentsections|1/22/2013
Section one:
The Database Concept.
1. What Is the Database?
A database is a collection of interrelated data. It can also be described as a repository for
data. Database and database technology have a major impact on the growing use of
computers. Database plays an important role in almost all areas where computers are used.
A Database is used in business, engineering, commerce, law, education, medicine, and
library science. A database has the following properties
a) A database is a logical collection of data with some
inherent meaning.
b) A database representing/capturing the information
about a real world enterprise or part of an enterprise.
c) A database collected and maintained to serve
specific data management needs of the enterprise.
d) Activities of the enterprise are supported by the database and continually update the
database.
e) A database can be any size and complexity.
2. Database Management System (DBMS)
Database management system is a collection of programs that enables users to create and
maintain the database. It is an aggregate of data, software, hardware, and user that helps an
enterprise manage its operational data. The main function of a DBMS is to provide efficient
and reliable methods of data retrieval to many users.
Defining a database involves specifying the different
type of data types, constraints, and structures of the data
to be stored in the database. DBMS is a central system
which provides a common interface between the data
and the various programs and application. It also
provides a central location for the whole data.
5. 4
TheDatabasesapplicationsingovernmentsections|1/22/2013
2.1 Functions of DBMS
a) Data Definition: The DBMS provides functions to define the structure of the data in
the application. Data Definition includes defining and modifying the record database
structure, include the type and size of fields and the various conditions to be satisfied
by the data in each field.
b) Data Manipulation: Once the data structure is defined data needs to be inserted,
modified and deleted. These functions which perform these operations are also part
of the DBMS. These functions can handle planned and unplanned data manipulation
needs.
c) Data Security and Integrity: The DBMS contains functions which handle the
security and integrity of data in the application. These can be easily developed by the
application and programmer, and need not code these functions in his/her programs.
d) Data Recovery and Concurrency: Recovery of data after a system failure and
concurrent access of records by multiple users also handled by the DBMS.
e) Performance: Optimizing the performance of the queries is one of the important
functions of DBMS. The DBMS has a set of programs forming the query optimizer
which evaluates the different implementations of a query and choose the best among
them.
f) Data Dictionary Maintenance: Marinating the Data Dictionary which contains the
data definition of the application is also one of the functions of a DBMS.
2.2 Advantage of DBMS
a) Controlling Redundancy: In DBMS, the data resides in one central database; the
various programs in the application can access data in different files. So data present
in one file don't need to be duplicated in another.
Such type of redundancy should be carefully controlled, eliminated and the DBMS
should be aware of it.
b) Data Consistency: Reduce data redundancy leads to better data consistency.
c) Data Integration: Since related data is stored in one single database, applying data
integrity is much easier. The functions in the DBMS can be used to enforce the
integrity rules in the application programs.
d) Data Sharing: Related data can be shared across programmes because data is stored
in a centralized manner.
e) Application Development Ease: The application programmer don't need to build the
functions for handling issues like security, concurrent access, data integrity etc.
The application programmer only needs to implement the application business rules.
6. 5
TheDatabasesapplicationsingovernmentsections|1/22/2013
This will enhance application development ease. Adding extra functional modules is
also easier than in file-based system.
f) Data Independence: Data independence is isolating an upper level from the changes
in the organization or structure of a lower level.
g) Reduced Maintenance: Maintenance is less easy due to the centralized nature of the
system.
3. Popular RDBMS
Relational Database Management System (RDBMS) is Database Management System
(DBMS) that is based on relational model invented by E.F Codd. There are many databases
currently in use. Most of the databases are based on relational
database model.
SQL is the most popular RDBMS. SQL is the standard language
for Relational Database system. SQL is Structured Query
Language, which is used for storing, manipulating and retrieving
data that is stored in relational database.
All relational database management system like MS Access, MySQL, Sybase, Oracle,
Postgres, Sybase and SQL Server use SQL language as a standard relational database
management system.
4. Database Security
Database technologies have a major impact on the growing use of computers.
Because of the significance of data and information in databases of any field, they have to
be secure and protected. Database security is a growing concern evidenced by an increase in
the number of reported incidents or unauthorized exposure of sensitive data.
Maintaining database security is the responsibility of the database management system rather
than the operating system or application programme. Security is a major issue in any database
management system. Security is achieved by granting access right to authorized users.
Database security can be divided into three following objective:
a. Secrecy: Secrecy is concerned with improper disclosure of information.
Confidentiality and non-disclosure are other name of secrecy.
b. Integrity: Integrity is concerned with improper modification of information.
7. 6
TheDatabasesapplicationsingovernmentsections|1/22/2013
c. Availability: Availability is concerned with improper denial of access to information.
These objectives arise in practically every database information system. Database security
contains a set of sub-topics, these includes access control, password management, database
vulnerability and auditing management.
4.1 Access Control
Access control is the process by which rights and privileges are assigned to users and
database objects. The primary method used to protect data is limiting access to the data.
The three mechanisms are distinctly different but usually used in combination with a focus
on access control for granularity in assigning rights to specific
objects and users. These are discretionary access control and
mandatory access control.
a. Discretionary Access Control: It controls the access by
applying a discretionary protection policy which governs
the user’s access to the information on the basis of user’s
identity and the rules that specify.
With DAC, we need to authorize each end user distinctly.
In future, if the group’s authority needs to change or be
cancelled and it will be a good idea to change each member’s exclusive right
separately, for this we need some kind of mechanism to make the access management
easy.
b. Mandatory Access Control: It is an access policy supported for systems that process
especially raw data. Systems that providing mandatory access controls must assign to
all subject to user and programme, and all object.
Mandatory Access Control use sensitivity labels to determine who can access the users
system. It implements a multi-level security policy for handling multiple information
classification at different security labels within a single computer system. A security
label associated with each data and each user.
4.2 Password Management
Most database system managements protect their end users password through implementing
and maintaining a password database. Using password management, access to the database
system will be controlled. Most of database management systems use their internal password
produced algorithm to produce the end user password randomly.
8. 7
TheDatabasesapplicationsingovernmentsections|1/22/2013
Passwords produced by this method are difficult for people to remember. It is usually allowed
end user to change their password periodically. The password’s length should be no less than
8 characters.
4.3 Auditing
Database auditing is used to track database access and user activity. Auditing can be used to
identify the accessed database objects.
Database auditing does not prevent security breaches, but it does provide a way to if breaches
have occurred. It provides a functionality to collect a set of records to show that the system
is intact and work properly. Auditing is divided into internal auditing and external auditing.
Internal auditing is a system level auditing mechanism used to audit a database system
continuously. External auditing is an auditing invoked manually by functions exported to the
outside world.
4.4 Database Vulnerability
Security breaches are an increasing incident. As more and more database accessible via the
internet and web based applications, there is more chance to security threats will raise.
The objective of database security is to reduce susceptibility to these threats. The most known
database application vulnerability is SQL injection. SQL injections can happen when SQL
statements are dynamically created user input. The threat occurs when users enter malicious
code that tricks the database into executing unintended command, The vulnerability occurs
primarily because of the features of the SQL language that allow such things as embedding
comments, concatenating SQL statement separated by semicolons, and the capability to
extract query metadata from the database. The solution to stopping SQL injection is input
validation.
5. Database Encryption
Encryption can provide strong for data stored in database. But when developing a database
encryption strategy must take many factors into consideration. In database encryption, where
should be performed the encryption, how much data should be encrypted, what type of
encryption algorithm used, and who should have access to the encryption keys?
There is two type of encryption level used in database encryption.
a. Storage-level Encryption: It is well suited for encrypting files or entire directories
in an operating system. From a database perspective, storage level encryption has the
9. 8
TheDatabasesapplicationsingovernmentsections|1/22/2013
advantage. On the other side, the storage subsystem has no knowledge of database
objects and its structure. The encryption strategy cannot be related with user
privileges. Thus, encrypting only portions of the database in order to decrease the
encryption overhead.
b. Database-level Encryption: It allows securing data when it is inserted or retrieved
from the database. The encryption strategy can be part of the database design and can
be related with user privileges. Database encryption can be done at various granulites,
such as tables, columns and rows. Depending on the level of integration of the
encryption feature and the DBMS, the encryption process may incur some changes to
the applications.
For both strategies, data is decrypted on the database server at runtime. Thus, the encryption
keys must be transmitted or kept with the encrypted data on the server side, providing a
limited protection against the server administrator.
6. Data Warehouse
A data warehouse is a subject-oriented, time-variant, integrated, and non-volatile collection
of data in support of managements’ decision making process. Data warehouse is a
semantically consistent data store that serves as a physical implementation of a decision
support data model and stores the
information on which an enterprise needs
to make strategic decision. Data warehouse
architecture is constructed by integrating
data from multiple sources to support
adhoc queries and analytical reporting.
Data warehouse provide on-line analytical
processing (OLAP) tools for the interactive
analysis of multidimensional data of for
effective data mining.
Data can be stored in different types of database. Data warehouse is also one type of database
architecture, which is a repository of multiple heterogeneous data sources, organized under
a single site in order to facilitate management decision making. Data warehouse technology
also includes data integrating, data cleaning, and online analytical processing (OLAP) as well
as the ability to view information from different angles.
10. 9
TheDatabasesapplicationsingovernmentsections|1/22/2013
6.1 Data warehousing Fundamentals
A data warehouse is a special repository of data designed to support decision making. The
data used in decision making comes from operational systems and external sources. To create
the data warehouse, data are extracted from source systems, cleaned, transformed and loaded
into a data store. A data store is a place in the data warehouse.
The data in data warehouse have the following characteristics:
a. Subject Oriented: The Data are logically organized around the organization needs,
such as, customer needs, sales or items produced.
b. Integrated: All data of an organization are combined and analyze together.
c. Time Variant: All historical data are maintained in detail form.
d. Non-Volatile: The data are read only not updated or changed by users.
A data warehouse draws data from operational systems, but it is physically separate and
serves different purpose. Operational systems have their own database, and are used for
transaction processing. Once the warehouse is created, users access the data in the warehouse
using tools and generate SQL (structure query language) queries Data warehousing is a
broader term and is used to describe, maintain, creation, and continuous checking of the data
in the warehouse.
6.2. OLTP and OLAP
An on-line operational system was to perform transaction and query processing. So they are
also termed as on-line transaction processing system (OLTP). Data warehouse systems serve
users in the role of data analysis and decision making. Such type of systems can organize
and present data in various formats according the needs of the different users, are called on-
line analytical processing system (OLAP).
6.3. Data Flow
The data flows from one or more sources database to intermediate staging area, and finally
into the data warehouse. At each stage there are data quality tools available to transform the
data and this will enhance the usability of the data once it resides in the data warehouses.
6.4. Data Mining
Data mining is the extraction or mining of knowledge from a large amount of data in data
warehouse. Data mining is the process of applying intelligent methods to extract data
11. 10
TheDatabasesapplicationsingovernmentsections|1/22/2013
patterns. To do this extraction data mining combines statistical analysis, artificial
intelligence, and database management systems to extract knowledge from stored data.
6.5 Decision making using a Data Warehousing
A Decision Support System is a tool used to improve the process of decision making in
complex system. A DSS allows a subsequent decision to be made and employ artificial
intelligence that provides detailed querying across a large datasets.
The most important application areas of DSS are those complicated systems that directly
answer questions. The data warehouse environment is more controlled and more reliable for
decision support system by providing high quality information, effective cleaning routines,
and valid data transformation rules and documented pre-summarization of data values.
Data Warehouse integrates data from multiple heterogeneous information sources and
transforms into multidimensional decision support systems. Data warehouse contains data
sources, operational data stores, data staging area, the global data warehouse, and data mart.
The data warehouse architecture must evolve to efficiently support the decision making
process within the organization that owns the data warehouse. All the data warehouse
components, process and data should be tracked and administrated by a metadata repository.
6.6 Data Warehouse Models
There are three data warehouse models used according to architectural point of view:
a. Enterprise Warehouse
• Collects all of the information about the entire organization.
• Provides organization wide data integration, usually from one or more
operational systems, and is cross-functional in scope.
• It contains detailed data as well as summarized data.
• Enterprise warehouse may be implemented on traditional mainframes.
b. Data Mart
• It contains data of a specific group of users, and its scope is confined to selected
subjects.
• Data marts are usually implemented on UNIX and window based server.
• The data in data mart can be summarized.
12. 11
TheDatabasesapplicationsingovernmentsections|1/22/2013
c. Virtual Warehouse
• It is a set of views as compare to operational databases.
• It is easy to build but require excess capacity to database servers.
• Some of the possible views may be materialized for efficient query processing.
7. Biometric Database and its uses
Biometric database refers to any computer data that is created during biometric process. The
biometric database includes biometric process such as, verification, identification, samples,
models, similarity, fingerprints etc, also in biometric, data are excluding the individuals name
and demographics location.
a) Biometric database is used to study human characteristics and their traits.
b) The purpose of biometric database is to identify individuals and group of people who
are under surveillance.
c) Biometric database is also used in computer science as a form of identification and
access control.
d) In biometric process, identification mode can be used to identify the person in two
ways either positive recognition or negative recognition.
e) The data collected during biometric process may be used in many ways. For example,
biometric security that utilizes the employees DNA profile could also be used for
various genetic diseases and undesirable traits.
13. 12
TheDatabasesapplicationsingovernmentsections|1/22/2013
8. The Database Backup & Restore methodologies and concept
Backup and recovery of database refers to various strategies and procedures that protecting
your database against data loss and also provide backup of any kind of data loss. Backup can
be divided into physical backups and logical backups.
a. In physical backups, physical files are used in storing
and recovering the database, such as control files, data
files and log files. Physical backups are the foundation of
any sound backup and recovery strategy.
b. A logical backup contains logical data such as, tables and
stored procedures. It is stored in a binary file. Logical
backups are a useful supplement to physical in many
cases.
8.1 Basic Concepts:
The physical structures of the database and the recovery process determine in the forms of
backup and recovery. The following basic concepts used in database backup and recovery.
a. Data Files and Data Blocks: When a database consists one or more files called data
files. The database would have one table space stored in one data file. The database
supervises the storage spaces in the data files of a database is called data blocks. Data
blocks are smallest units of storage of the database.
b. Redo Logs: Redo logs records all changes made to a database’s data files. Each time
data is changed in the database, that changes first online redo log, before it is applied
to the data files.
c. Control Files: The control file contains the record of physical structures of the
database and their status. Control files contains several types of information such as,
database information, table space and data file records, log records and information
about corrupt data files
d. Undo Segments: When data in a data file is updated of that data in database are
written into undo segments. Undo information can be used to restore the original data
file contents. When a transaction is rolled back.
14. 13
TheDatabasesapplicationsingovernmentsections|1/22/2013
Section 2:
Database's usage in the government sectors
Technology is changing our lives at an unprecedented pace. These days, any government
not transformed into the technology will considered as an outdated government!
While the data entry is huge and from many parts in the government systems, the DBMS is
playing an important role, the examples below show the importance of adapting DBMS in
governmental sectors:
1- In Health sector
The government in Turkey adopted the technology well in the health care sector.
In 2014, the number of employees working in the healthcare sector is 650,000
employees, in the plan of Ministry of Health, they are aiming for employer 715,000
employees in 2015, then 1,100,000 employees in 2023.healthcare sector
It will be impossible to manage these huge number of employees that will treating
millions of patients if there is no DBMS. Therefore, there is a global database
contains all patients historical data. For example, If any patient went to any hospital
in Turkey, his symptoms' details, medical analysis, X-Rays result, and the Prescribed
medication will registered in that database, Thus if he go to any other hospital or
Polyclinic, their medical records will be available, also, the pharmacies also has an
accessibility to that data, so they can give the right medicines without mistakes.
Moreover, the patient has ability to book the appointment at any hospital or
Polyclinic in Turkey through a mobile application by using his national ID!
2- In Traffic management sector
The Dubai police use ANPR (Automatic number plate recognition) cameras to
monitor vehicles in front and either side of the patrol car, this is a mass surveillance
method that uses optical character recognition on
images to read vehicle registration plates.
This plate's number registered in a central database to
record all traffic violations and in searching for wanted
cars.
15. 14
TheDatabasesapplicationsingovernmentsections|1/22/2013
3- In Educations sector
Today in education sectors, most universities – like ours- provide their students
online education and other services such as Student registration, student
performance, E-library etc.
If we compare the universities today vs 15 years ago in some counties; students were
had to visit the university and stand in a long queue to make the registration process,
as well as they had to search on shelf within the books about what they want!
Today, most university use the database in a backend to be used online and make all
processes is much easier, in additional, we can't imagine how much the researches
were difficult in situation of all books were paper!
4- In Security sector
The British Home Office had a real-life example of securing their borders, by
adopting e-Borders system, It was intended to
provide a searchable record of everyone
entering and leaving the country, record their
passport number, email address and purpose
of visit, and generate a warning if anyone on a
terrorist or criminal watch list was arriving.
16. 15
TheDatabasesapplicationsingovernmentsections|1/22/2013
Section 3:
THE ROLE OF DATABASE SYSTEM IN ANTI-
TERRORIST
The terrorists took advantage of new technologies and adapt them to serve their evil aims
where benefited from portable mobile devices and related satellite in addition to the use of
encrypted e-mail, and the Internet for training and recruitment, incitement and
communicate with each other and electronic circuits for timing and programming.
After the terrorist bombings of 11th
of September 2001 in the United States the technology
has become essential to play a role in helping countries that suffered terrorist and criminals
and promote security and stability in other countries of operations through the provision of
protection for the lives of innocent citizens, therefore, there was a demand to find methods
and techniques to monitor and follow the Suspects, either through observation of their
locations via satellite or their virtual positions on the web or monitor their communication
devices to know them and being able to reach them, and to limit the movement of terrorists
and make their movements more difficult through the activation of biotechnology and
published in the sensitive sites because they provide the possibility of these technologies
and greater ease in the automatic identification and verification of the suspects.
In March 2011, the Syrian revolution began with nationwide protests against dictator
president whose forces responded with violent crackdowns. The conflict gradually
morphed from popular protests to an armed rebellion after months of military sieges.
These conflict created a breeding ground to collect the terrorist's organizations from the
globe and each organization has his own agendas.
The political analysts expect that even if the current president went, those terrorist
organizations will still fighting each other's to reach to their goals and avoid the Syrian
Interim Government - which is elected by Syrian people - to reach the state presidency and
Ignite chaos and run another civilian war.
Based on above, Here's the role of the Syrian Interim Government to take the initiative and
start planning for transform into the technology and adopting the concept of database
technologies to limit the movement of terrorists and maintain the security.
17. 16
TheDatabasesapplicationsingovernmentsections|1/22/2013
9.1 How can the new Syrian Government take advantage of the Database
systems to protect country?
9.1.1 Design the database:
The main and hardest task waiting the new Syrian government is to set a system create the
main database and minimize the paper documents as much as they can.
This database must be hosted in a secure data center and be accessible from anywhere in
Syria based on predefined access privilege's policy. The database must has – but not
limited to -the following tables:
• Citizens and residents table:
This table contain the main master data of citizens and residents people.
The data entry in this table will be mainly by civil affairs department and
immigration department.
• Criminals table:
This table contain the criminal records that happen in Syria by anyone.
The data entry in this table will be mainly by Police, Criminal investigation
department, courts...
• Passport's table:
It's contains the data of passports that issued for Syrian citizens.
The data entry in this table will be mainly by Passport General Department
• Fingerprint table
This table contain the data of all people that live over Syrians' cities (citizens,
Residents, and visitors)
The data entry in this table will be mainly by: Police, Border officers,
Ministry of the Interior, and other parties that need to verify identity.
• Citizens_Residents_Airports_TRX
This table contain the data of all countries has been visited in the past for all
people. This table will hold data of countries that everyone travel to or
coming from.
The data of this table should be updated automatically by the airline and
18. 17
TheDatabasesapplicationsingovernmentsections|1/22/2013
airports systems.
• Travelers transactions
This table contain the data transaction of all people that traveling from/to
Syria through the airport, port, and land borders.
The data entry in this table will be mainly by the border officers.
• Wanted table
This table contains the data of all wanted people to be used on the country
borders to catch them while trying to travel
The data entry in this table will be mainly by the border officers, Police,
Ministry of the Interior, Criminal investigation department, court.
To maintain the integrity and accuracy of the data, the above tables must has a relationship
between their fields', as well as each tables should have a primary key, each table can have
only ONE primary key.
The figure below shown the Database structure and illustrate the tables' fields and
relationships between them. (This database created on Microsoft SQL Server 2012)
We can notes that the "Social_Num" and "Passport_Num" fields are existed in all tables,
that’s because we need to link everything with either Passport Numbers or Social Number.
Note:
There must be more than fields and tables than I mentioned above, but I'm try to focusing on the
concept by set a sample tables that may be used in the in maintain the security and tracking the
terrorists.
20. 19
TheDatabasesapplicationsingovernmentsections|1/22/2013
Scenario 1:
We may execute the below query on the database to the export all people that arrived
Aleppo's city from Bagdad (Iraq's capital) in a month period before 31/12/2013 and send it
to the investigators.
The result of above query presented 2 people who has arrived Aleppo coming from Iraq in
period between '01/12/2013' AND '31/12/2013'
SELECT dbo.Citizens_Residents.Social_Num, dbo.Citizens_Residents.Name, dbo.Citizens_Residents.[Father's name],
dbo.Citizens_Residents.[Family name], dbo.Citizens_Residents.Picture, dbo.Citizens_Residents.sex,
dbo.Citizens_Residents.[Present Address], dbo.Citizens_Residents.[Mobile number],
dbo.Citizens_Residents_Airports_TRX.Passport_Num, dbo.Citizens_Residents_Airports_TRX.TRX_port,
dbo.Citizens_Residents_Airports_TRX.TRX_date, dbo.Citizens_Residents_Airports_TRX.TRX_Type,
dbo.Citizens_Residents_Airports_TRX.Destination, dbo.Citizens_Residents.[Residency status]
FROM dbo.Citizens_Residents INNER JOIN dbo.Citizens_Residents_Airports_TRX ON
dbo.Citizens_Residents.Social_Num = dbo.Citizens_Residents_Airports_TRX.Social_Num
WHERE (dbo.Citizens_Residents_Airports_TRX.Destination = 'Bagdad') AND
(dbo.Citizens_Residents_Airports_TRX.TRX_Type = 'Arrive') AND (dbo.Citizens_Residents_Airports_TRX.TRX_date
BETWEEN '01/12/2013' AND '31/12/2013')
Example:
Let's suppose the there is a terrorist crime happen in Syria in Aleppo's city in 31/12/2013, and
the investigators have a doubt that there are the hands of terrorists originating
from Iraq, they found some tools that used by the terrorist and they scanned
the Fingerprints from that tools, that fingerprint converted into a binary
data by a special device and the fingerprint value was: 0111001011011110
21. 20
TheDatabasesapplicationsingovernmentsections|1/22/2013
Scenario 2:
We may also run the below query to export the people who have one of their fingerprints
has a value equal 0111001011011110, regardless if he travelled or not!
The result of above query listed 2 persons one of their finger prints equal to 0111001011011110.
Now it's clear that "Kamil Hafiz Solo" is the suspect person because his left thumb
fingerprint's value equal 0111001011011110 as well as he was from the people who arrived from
Iraq in a month before the crime.
Now it's important to circulate suspect's
information to all security offices and country's
borders, and that may happening by inserting the
suspect's data into "Wanted" table,
The SQL code (in the right) will insert his data to
"Wanted" table.
SELECT dbo.Citizens_Residents.Name, dbo.Citizens_Residents.[Father's name], dbo.Citizens_Residents.[Family name],
dbo.Citizens_Residents.sex, dbo.Citizens_Residents.[Present Address], dbo.FingerPrints.Left_Thumb,
dbo.FingerPrints.[Left_Index finger], dbo.FingerPrints.Left_other_Fingers, dbo.FingerPrints.Right_Thumb,
dbo.FingerPrints.[Right_Index finger], dbo.FingerPrints.Right_other_Fingers
FROM dbo.FingerPrints INNER JOIN
dbo.Citizens_Residents ON dbo.FingerPrints.Social_Num = dbo.Citizens_Residents.Social_Num
WHERE (dbo.FingerPrints.Left_Thumb = '0111001011011110') OR
(dbo.FingerPrints.[Left_Index finger] = '0111001011011110') OR
(dbo.FingerPrints.Left_other_Fingers = '0111001011011110') OR
(dbo.FingerPrints.Right_Thumb = '0111001011011110') OR
(dbo.FingerPrints.[Right_Index finger] = '0111001011011110') OR
(dbo.FingerPrints.Right_other_Fingers = '0111001011011110')
USE [Syrian_Goverment]
GO
INSERT INTO [dbo].[Wanted]
([firts name]
,[family name]
,[social number]
,[Passport number])
VALUES
('Kamil', 'Solo', '2321092','1232123')
GO
22. 21
TheDatabasesapplicationsingovernmentsections|1/22/2013
9.1.2. Database Triggers
To make the system is a tight system, we can take the advantage of "Database Triggers ".
A database trigger is procedural code that is automatically executed in response to certain
events on a particular table or view in a database. The trigger is mostly used for
maintaining the integrity of the information on the database.
Now in our example, we can create a trigger on a " Citizens_Residents_Airports_TRX"
table to be run at every transaction happening on that record, in other word, when any
people departure or arrive to Syria through any border (airport, seaport or land port) the
trigger will run and check if the person name listed in the "Wanted" table, in case of his
name is exist, the alert message will appear front of the airport officer to take the action.
Note3:
The users must use a friendly application that communicate with above database, and all above
queries and results should be executed and called through the application.
The purpose of above queries id to demonstrate how that data may processed in the database.
23. 22
TheDatabasesapplicationsingovernmentsections|1/22/2013
9.1.3. Carter center's experience: Using Technology to Map Conflict in Syria
The Carter Center, in partnership with Emory University, is guided by a fundamental
commitment to human rights and the alleviation of human suffering. It seeks to prevent and
resolve conflicts, enhance freedom and democracy, and improve health.
This center launched Syria Conflict Mapping Project to examine the massive amounts of
citizen-generated information related to the Syrian conflict that is available online.
Specifically, the project:
1. details the growth of opposition armed groups in each governorate within Syria;
2. illuminates the evolution of armed opposition hierarchies at the local, regional, and
national levels;
3. documents the formation of pro-government paramilitary forces;
4. shows the current geographic delineation of pro and anti-government forces; and
5. Provides up-to-date analysis on the current state of the conflict.
Carter Center used Data analysis tools provided by "Palantir Technologies" in integrating,
analyzing, and visualizing the large
amounts of information collected
(like The Armed groups' videos, the
terrorist's activities on the social
media).
Conclusion
In this paper I tried to shine the light on the database concepts and exploring some examples
of its usage.
I come to the conclusion that, to build an arbitrator database management system, the
database structure must be designed well from the beginning based on the functional
requirements of the system we are aiming to build.
Other important thing – from my experience- it's very important to adjust the data inputs,
because the outputs is based on the input, and if the input is not accurate or has errors, the
output is also the same!
24. 23
TheDatabasesapplicationsingovernmentsections|1/22/2013
References
• Abrams, M. J. (1995). Information security An integrated collection of Essays. IEEE Computer Society Press.
• Bertino, E. &. (2005). Database security—concepts, approaches, and challenges. IEEE Transactions actions on Dependable and
Secure Computing, , 2-18.
• Bhaskar, K. (1993). Computer Security: Threats and Countermeasures. published by NCC Blackwell.
• Chaudhuri, S. &. (1997). An Overview of Data Warehousing and OLAP Technology. SIGMOD Record 26:1, Mar, pp 65-74.
• Inmon, W. (1996). Building the Data Warehouse, Second Edition. New York: John Wiley & Sons.
• Jain AK, R. A. (2006). Biometrics: a tool for information. IEEE Trans Inform Forensics , Sec 1:125–143.
• Jaquith, A. (2007). Security metrics: Replacing fear, uncertainty, and doubt. Redwood City, CA: Addison- Wesley Professional.
• Kachur, R. (2000). Data Warehouse Management Handbook. Paramus: Prentice Hall.
• Navathe, E. &. (2007). Fundamentals of Database Systems (Sixth Edition). Pearson Publication.
• PJ, F. (2008). Biometric databases. In: Handbook of biometrics. Heidelberg: Springer.
• Yang, L. (2009). Teaching database security and auditing. Proceedings of the 40th ACM Technical Symposium on Computer
Science Education .
• Hospitals without Queues (2014). TV series Tourists Memoirs season 8 (Arabic), Dr. Ali Al Omari. Available from:
http://www.youtube.com/watch?v=tFgBf0TUSn0&feature=youtu.be (Accessed: 10 Jan 2015 GMT 14:11:06).
• Oweis, Khaled Yacoub; Solomon, Erika (22 February 2012). "Bombardment of Syria's Homeless kills 21 people".
Reuters. Retrieved 21 July 2014
• GeoVITe - Geodata Visualization & Interactive Training Environment, Image
URL:https://geodata.ethz.ch/resources/tutorials/L4GeodataManagement/en/html/unit_u2DataMana.html
acsessed:18/01/2015
• Attribute-Based Messaging and Security, Image URL:https://seclab.illinois.edu/attribute-based-messaging-and-
security, acsessed:18/01/2015
• Image URL:http://www.controlsystemworks.com/Product/Features/DataSources/Databases.aspx ,
acsessed:18/01/2015
• What are Biometrics?, Image URL:http://walkahwalkah.org/main/downloads/biometrics-primer/,
acsessed:18/01/2015
• Database trigger, Wikipedia, The Free Encyclopaedia. Wikimedia Foundation, Inc.
URL:http://en.wikipedia.org/wiki/Database_trigger, accessed at:21/01/2015
• Automatic number plate recognition, Wikipedia, The Free Encyclopaedia. Wikimedia Foundation, Inc.
URL:http://en.wikipedia.org/wiki/Automatic_number_plate_recognition, accessed at:21/01/2015
• "British Home Office", Why Do Projects Fail?, Aug 18th, 2014 url:http://calleam.com/WTPF/?p=6773, accessed
at 21/01/2015
• "Syria Conflict Mapping Project",Carter Center, URL:
http://www.cartercenter.org/peace/conflict_resolution/syria-conflict-mapping.html,accessed at:21/01/2015