Database Security : : Problems and Solutions / / Christopher Diaz.
Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader re...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2022] ©2022 |
Year of Publication: | 2022 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (350 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781683926627 |
---|---|
ctrlnum |
(DE-B1597)654035 |
collection |
bib_alma |
record_format |
marc |
spelling |
Diaz, Christopher, author. aut http://id.loc.gov/vocabulary/relators/aut Database Security : Problems and Solutions / Christopher Diaz. Dulles, VA : Mercury Learning and Information, [2022] ©2022 1 online resource (350 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Information Security, Data Security, and Database Security -- CHAPTER 2: Database Design -- CHAPTER 3: Database Management and Administration -- CHAPTER 4: Database User Accounts -- CHAPTER 5: Database Privileges -- CHAPTER 6: Roles -- CHAPTER 7: Database Security Controls for Confidentiality -- CHAPTER 8: Transactions for Data Integrity -- CHAPTER 9: Data Integrity with Concurrent Access -- Appendix -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach. Each chapter also has a set of questions and follow up projects to reinforce comprehension of the material. FEATURES:Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows) to be applicable for nearly every student and professionalEnd of chapter exercises to enhance comprehension of topics Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023) Computer security. Database security. Data. E-Commerce. IT Management & Security. COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce). bisacsh Linux/UNIX. MacOS. Microsoft SQL Server. MySQL. Oracle. Windows. computer science. cybersecurity. data analytics. data science. database normalization. e-commerce. referential integrity. transactions. EPUB 9781683926610 print 9781683926634 https://www.degruyter.com/isbn/9781683926627 Cover https://www.degruyter.com/document/cover/isbn/9781683926627/original |
language |
English |
format |
eBook |
author |
Diaz, Christopher, Diaz, Christopher, |
spellingShingle |
Diaz, Christopher, Diaz, Christopher, Database Security : Problems and Solutions / Frontmatter -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Information Security, Data Security, and Database Security -- CHAPTER 2: Database Design -- CHAPTER 3: Database Management and Administration -- CHAPTER 4: Database User Accounts -- CHAPTER 5: Database Privileges -- CHAPTER 6: Roles -- CHAPTER 7: Database Security Controls for Confidentiality -- CHAPTER 8: Transactions for Data Integrity -- CHAPTER 9: Data Integrity with Concurrent Access -- Appendix -- Index |
author_facet |
Diaz, Christopher, Diaz, Christopher, |
author_variant |
c d cd c d cd |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Diaz, Christopher, |
title |
Database Security : Problems and Solutions / |
title_sub |
Problems and Solutions / |
title_full |
Database Security : Problems and Solutions / Christopher Diaz. |
title_fullStr |
Database Security : Problems and Solutions / Christopher Diaz. |
title_full_unstemmed |
Database Security : Problems and Solutions / Christopher Diaz. |
title_auth |
Database Security : Problems and Solutions / |
title_alt |
Frontmatter -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Information Security, Data Security, and Database Security -- CHAPTER 2: Database Design -- CHAPTER 3: Database Management and Administration -- CHAPTER 4: Database User Accounts -- CHAPTER 5: Database Privileges -- CHAPTER 6: Roles -- CHAPTER 7: Database Security Controls for Confidentiality -- CHAPTER 8: Transactions for Data Integrity -- CHAPTER 9: Data Integrity with Concurrent Access -- Appendix -- Index |
title_new |
Database Security : |
title_sort |
database security : problems and solutions / |
publisher |
Mercury Learning and Information, |
publishDate |
2022 |
physical |
1 online resource (350 p.) Issued also in print. |
contents |
Frontmatter -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Information Security, Data Security, and Database Security -- CHAPTER 2: Database Design -- CHAPTER 3: Database Management and Administration -- CHAPTER 4: Database User Accounts -- CHAPTER 5: Database Privileges -- CHAPTER 6: Roles -- CHAPTER 7: Database Security Controls for Confidentiality -- CHAPTER 8: Transactions for Data Integrity -- CHAPTER 9: Data Integrity with Concurrent Access -- Appendix -- Index |
isbn |
9781683926627 9781683926610 9781683926634 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 D314 D53 42022 |
url |
https://www.degruyter.com/isbn/9781683926627 https://www.degruyter.com/document/cover/isbn/9781683926627/original |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT diazchristopher databasesecurityproblemsandsolutions |
status_str |
n |
ids_txt_mv |
(DE-B1597)654035 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Database Security : Problems and Solutions / |
_version_ |
1775793046523215872 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04432nam a22008175i 4500</leader><controlfield tag="001">9781683926627</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230808014301.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230808t20222022 fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683926627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)654035</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">vau</subfield><subfield code="c">US-VA</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.D314</subfield><subfield code="b">D53 2022</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM064000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221202</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diaz, Christopher, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Database Security :</subfield><subfield code="b">Problems and Solutions /</subfield><subfield code="c">Christopher Diaz.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA : </subfield><subfield code="b">Mercury Learning and Information, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (350 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Dedication -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">CHAPTER 1: Introduction to Information Security, Data Security, and Database Security -- </subfield><subfield code="t">CHAPTER 2: Database Design -- </subfield><subfield code="t">CHAPTER 3: Database Management and Administration -- </subfield><subfield code="t">CHAPTER 4: Database User Accounts -- </subfield><subfield code="t">CHAPTER 5: Database Privileges -- </subfield><subfield code="t">CHAPTER 6: Roles -- </subfield><subfield code="t">CHAPTER 7: Database Security Controls for Confidentiality -- </subfield><subfield code="t">CHAPTER 8: Transactions for Data Integrity -- </subfield><subfield code="t">CHAPTER 9: Data Integrity with Concurrent Access -- </subfield><subfield code="t">Appendix -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach. Each chapter also has a set of questions and follow up projects to reinforce comprehension of the material. FEATURES:Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows) to be applicable for nearly every student and professionalEnd of chapter exercises to enhance comprehension of topics</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-Commerce.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Management & Security.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Linux/UNIX.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">MacOS.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Microsoft SQL Server.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">MySQL.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Oracle.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Windows.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybersecurity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data analytics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">database normalization.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">e-commerce.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">referential integrity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transactions.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781683926610</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781683926634</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781683926627</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781683926627/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |