Return to Article Details Analysis of modern tools, methods of audit and monitoring of database security Download Download PDF