Database Security : : Problems and Solutions / / Christopher Diaz.

Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader re...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2022]
©2022
Year of Publication:2022
Language:English
Online Access:
Physical Description:1 online resource (350 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781683926627
ctrlnum (DE-B1597)654035
collection bib_alma
record_format marc
spelling Diaz, Christopher, author. aut http://id.loc.gov/vocabulary/relators/aut
Database Security : Problems and Solutions / Christopher Diaz.
Dulles, VA : Mercury Learning and Information, [2022]
©2022
1 online resource (350 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Dedication -- Contents -- Preface -- CHAPTER 1: Introduction to Information Security, Data Security, and Database Security -- CHAPTER 2: Database Design -- CHAPTER 3: Database Management and Administration -- CHAPTER 4: Database User Accounts -- CHAPTER 5: Database Privileges -- CHAPTER 6: Roles -- CHAPTER 7: Database Security Controls for Confidentiality -- CHAPTER 8: Transactions for Data Integrity -- CHAPTER 9: Data Integrity with Concurrent Access -- Appendix -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach. Each chapter also has a set of questions and follow up projects to reinforce comprehension of the material. FEATURES:Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows) to be applicable for nearly every student and professionalEnd of chapter exercises to enhance comprehension of topics
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023)
Computer security.
Database security.
Data.
E-Commerce.
IT Management & Security.
COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce). bisacsh
Linux/UNIX.
MacOS.
Microsoft SQL Server.
MySQL.
Oracle.
Windows.
computer science.
cybersecurity.
data analytics.
data science.
database normalization.
e-commerce.
referential integrity.
transactions.
EPUB 9781683926610
print 9781683926634
https://www.degruyter.com/isbn/9781683926627
Cover https://www.degruyter.com/document/cover/isbn/9781683926627/original
language English
format eBook
author Diaz, Christopher,
Diaz, Christopher,
spellingShingle Diaz, Christopher,
Diaz, Christopher,
Database Security : Problems and Solutions /
Frontmatter --
Dedication --
Contents --
Preface --
CHAPTER 1: Introduction to Information Security, Data Security, and Database Security --
CHAPTER 2: Database Design --
CHAPTER 3: Database Management and Administration --
CHAPTER 4: Database User Accounts --
CHAPTER 5: Database Privileges --
CHAPTER 6: Roles --
CHAPTER 7: Database Security Controls for Confidentiality --
CHAPTER 8: Transactions for Data Integrity --
CHAPTER 9: Data Integrity with Concurrent Access --
Appendix --
Index
author_facet Diaz, Christopher,
Diaz, Christopher,
author_variant c d cd
c d cd
author_role VerfasserIn
VerfasserIn
author_sort Diaz, Christopher,
title Database Security : Problems and Solutions /
title_sub Problems and Solutions /
title_full Database Security : Problems and Solutions / Christopher Diaz.
title_fullStr Database Security : Problems and Solutions / Christopher Diaz.
title_full_unstemmed Database Security : Problems and Solutions / Christopher Diaz.
title_auth Database Security : Problems and Solutions /
title_alt Frontmatter --
Dedication --
Contents --
Preface --
CHAPTER 1: Introduction to Information Security, Data Security, and Database Security --
CHAPTER 2: Database Design --
CHAPTER 3: Database Management and Administration --
CHAPTER 4: Database User Accounts --
CHAPTER 5: Database Privileges --
CHAPTER 6: Roles --
CHAPTER 7: Database Security Controls for Confidentiality --
CHAPTER 8: Transactions for Data Integrity --
CHAPTER 9: Data Integrity with Concurrent Access --
Appendix --
Index
title_new Database Security :
title_sort database security : problems and solutions /
publisher Mercury Learning and Information,
publishDate 2022
physical 1 online resource (350 p.)
Issued also in print.
contents Frontmatter --
Dedication --
Contents --
Preface --
CHAPTER 1: Introduction to Information Security, Data Security, and Database Security --
CHAPTER 2: Database Design --
CHAPTER 3: Database Management and Administration --
CHAPTER 4: Database User Accounts --
CHAPTER 5: Database Privileges --
CHAPTER 6: Roles --
CHAPTER 7: Database Security Controls for Confidentiality --
CHAPTER 8: Transactions for Data Integrity --
CHAPTER 9: Data Integrity with Concurrent Access --
Appendix --
Index
isbn 9781683926627
9781683926610
9781683926634
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 D314 D53 42022
url https://www.degruyter.com/isbn/9781683926627
https://www.degruyter.com/document/cover/isbn/9781683926627/original
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT diazchristopher databasesecurityproblemsandsolutions
status_str n
ids_txt_mv (DE-B1597)654035
carrierType_str_mv cr
is_hierarchy_title Database Security : Problems and Solutions /
_version_ 1775793046523215872
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04432nam a22008175i 4500</leader><controlfield tag="001">9781683926627</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230808014301.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230808t20222022 fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683926627</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)654035</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">vau</subfield><subfield code="c">US-VA</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.D314</subfield><subfield code="b">D53 2022</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM064000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23/eng/20221202</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Diaz, Christopher, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Database Security :</subfield><subfield code="b">Problems and Solutions /</subfield><subfield code="c">Christopher Diaz.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA : </subfield><subfield code="b">Mercury Learning and Information, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (350 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Dedication -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">CHAPTER 1: Introduction to Information Security, Data Security, and Database Security -- </subfield><subfield code="t">CHAPTER 2: Database Design -- </subfield><subfield code="t">CHAPTER 3: Database Management and Administration -- </subfield><subfield code="t">CHAPTER 4: Database User Accounts -- </subfield><subfield code="t">CHAPTER 5: Database Privileges -- </subfield><subfield code="t">CHAPTER 6: Roles -- </subfield><subfield code="t">CHAPTER 7: Database Security Controls for Confidentiality -- </subfield><subfield code="t">CHAPTER 8: Transactions for Data Integrity -- </subfield><subfield code="t">CHAPTER 9: Data Integrity with Concurrent Access -- </subfield><subfield code="t">Appendix -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach. Each chapter also has a set of questions and follow up projects to reinforce comprehension of the material. FEATURES:Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows) to be applicable for nearly every student and professionalEnd of chapter exercises to enhance comprehension of topics</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-Commerce.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Management &amp; Security.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Electronic Commerce (see also headings under BUSINESS &amp; ECONOMICS / ECommerce).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Linux/UNIX.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">MacOS.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Microsoft SQL Server.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">MySQL.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Oracle.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Windows.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybersecurity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data analytics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">data science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">database normalization.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">e-commerce.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">referential integrity.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transactions.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781683926610</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781683926634</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781683926627</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781683926627/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>