Sooner or later you will have to face an attempt of unauthorized intentional or accidental data or object definition change, exploit of security vulnerability, or even a malicious modification by an unethical system administrator. Learn how to be prepared for such possibilities and ensure you can track their source and prevent them from happening in the future.

This story continues at http://www.databasejournal.com/featu...le.php/3399241