Database Security : : Problems and Solutions / / Christopher Diaz.
Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader re...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2022] ©2022 |
Year of Publication: | 2022 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (350 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 04432nam a22008175i 4500 | ||
---|---|---|---|
001 | 9781683926627 | ||
003 | DE-B1597 | ||
005 | 20230808014301.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 230808t20222022 fo d z eng d | ||
020 | |a 9781683926627 | ||
035 | |a (DE-B1597)654035 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a vau |c US-VA | ||
050 | 4 | |a QA76.9.D314 |b D53 2022 | |
072 | 7 | |a COM064000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23/eng/20221202 |
100 | 1 | |a Diaz, Christopher, |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 0 | |a Database Security : |b Problems and Solutions / |c Christopher Diaz. |
264 | 1 | |a Dulles, VA : |b Mercury Learning and Information, |c [2022] | |
264 | 4 | |c ©2022 | |
300 | |a 1 online resource (350 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
505 | 0 | 0 | |t Frontmatter -- |t Dedication -- |t Contents -- |t Preface -- |t CHAPTER 1: Introduction to Information Security, Data Security, and Database Security -- |t CHAPTER 2: Database Design -- |t CHAPTER 3: Database Management and Administration -- |t CHAPTER 4: Database User Accounts -- |t CHAPTER 5: Database Privileges -- |t CHAPTER 6: Roles -- |t CHAPTER 7: Database Security Controls for Confidentiality -- |t CHAPTER 8: Transactions for Data Integrity -- |t CHAPTER 9: Data Integrity with Concurrent Access -- |t Appendix -- |t Index |
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach. Each chapter also has a set of questions and follow up projects to reinforce comprehension of the material. FEATURES:Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows) to be applicable for nearly every student and professionalEnd of chapter exercises to enhance comprehension of topics | ||
530 | |a Issued also in print. | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023) | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Database security. | |
650 | 4 | |a Data. | |
650 | 4 | |a E-Commerce. | |
650 | 4 | |a IT Management & Security. | |
650 | 7 | |a COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce). |2 bisacsh | |
653 | |a Linux/UNIX. | ||
653 | |a MacOS. | ||
653 | |a Microsoft SQL Server. | ||
653 | |a MySQL. | ||
653 | |a Oracle. | ||
653 | |a Windows. | ||
653 | |a computer science. | ||
653 | |a cybersecurity. | ||
653 | |a data analytics. | ||
653 | |a data science. | ||
653 | |a database normalization. | ||
653 | |a e-commerce. | ||
653 | |a referential integrity. | ||
653 | |a transactions. | ||
776 | 0 | |c EPUB |z 9781683926610 | |
776 | 0 | |c print |z 9781683926634 | |
856 | 4 | 0 | |u https://www.degruyter.com/isbn/9781683926627 |
856 | 4 | 2 | |3 Cover |u https://www.degruyter.com/document/cover/isbn/9781683926627/original |
912 | |a EBA_CL_CHCOMSGSEN | ||
912 | |a EBA_DGALL | ||
912 | |a EBA_EBKALL | ||
912 | |a EBA_ECL_CHCOMSGSEN | ||
912 | |a EBA_EEBKALL | ||
912 | |a EBA_ESTMALL | ||
912 | |a EBA_STMALL | ||
912 | |a GBV-deGruyter-alles | ||
912 | |a PDA12STME | ||
912 | |a PDA13ENGE | ||
912 | |a PDA18STMEE | ||
912 | |a PDA5EBK |