Part 4
IN THIS PART …
Controlling access
Protecting data from corruption
Applying procedural languages