1. Introduction to Vector Security : Database Procedures
 
Share this page                  
Database Procedures
Database procedures provide an extra level of control over data access and modification. Database procedures can be used with security alarms to enhance security auditing.