1. Introduction to Vector Security
:
Database Procedures
Share this page
Database Procedures
Database procedures provide an extra level of control over data access and modification. Database procedures can be used with security alarms to enhance security auditing.