Atabase Design and Development Exercise

1I am going to upload assignment criteria.br /
2The deadline on 17-03-2014 by 10:00.br /
3You should no plagiarism.br /
4I am going to upload some powerpoint and word document to help you if you need it.br /
br /
Referencing Requirements:br /
Core text: Connolly, T.M & Begg, C, Strachan, A (2009) Database Systems A Practical Approach to Design, Implementation & Management, 5th Edition, (Addison-Wesley).br /
br /
**Another references:br /
1-Atzeni, Ceri, Paraboschi & Torlone (1999) Database Systems: Concepts, Languages & Architectures (McGraw Hill), ISBN 007-709500-6br /
br /
2Date, C. J., (2000) An Introduction to Database Systems, 7th Ed., (Addison-Wesley), ISBN 0-201-38590-2 br /
br /
3Eaglestone, B. & Ridley, M (1998) Object Databases: An Introduction, (McGraw Hill), ISBN 0-07-709354-2br /
br /
4Schneier, B. (1996) Applied Cryptography (Wiley), ISBN: 0-471-11709-9br /
br /
5Smart, N. (2003) Cryptography, an Introduction (McGraw-Hill), ISBN: 0-07-709987-7br /
br /
6Bishop, M. (2003) Computer Security, Art and Science (Addison Wesley), ISBN: 0-201-4409-7br /
br /
7Burnett, S., Paine, S. (2001) RSA Securitys Official Guide to Cryptography (McGraw-Hill), ISBN: 007213139Xbr /
br /
8Stallings, W. (2000) Network Security Essentials (Prentice Hall)br /
br /
9Keyser T. and Dainty C. (2004) The Information Governance Toolkit: Data Protection, Caldicott Confidentiality, Radcliffe Publishing Ltd, ISBN: 978-1857756005