Part 4

Controlling Operations

IN THIS PART …

Controlling access

Protecting data from corruption

Applying procedural languages