作者: Mark Cameron Little
DOI:
关键词: Database connectivity 、 Client–server model 、 Operating system 、 Log shipping 、 Application server 、 Computer science 、 Java 、 Decoy
摘要: A computing device, executing a decoy application server that does not have access to real data, receives service request from client. The protects designated server, wherein the and include instances of single Java program. establishes connection false database via Database Connectivity (JDBC) driver. retrieves data database, provides