Database Security : : Problems and Solutions / / Christopher Diaz.

Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader re...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2022]
©2022
Year of Publication:2022
Language:English
Online Access:
Physical Description:1 online resource (350 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 04432nam a22008175i 4500
001 9781683926627
003 DE-B1597
005 20230808014301.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 230808t20222022 fo d z eng d
020 |a 9781683926627 
035 |a (DE-B1597)654035 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a vau  |c US-VA 
050 4 |a QA76.9.D314  |b D53 2022 
072 7 |a COM064000  |2 bisacsh 
082 0 4 |a 005.8  |2 23/eng/20221202 
100 1 |a Diaz, Christopher,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Database Security :  |b Problems and Solutions /  |c Christopher Diaz. 
264 1 |a Dulles, VA :   |b Mercury Learning and Information,   |c [2022] 
264 4 |c ©2022 
300 |a 1 online resource (350 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Dedication --   |t Contents --   |t Preface --   |t CHAPTER 1: Introduction to Information Security, Data Security, and Database Security --   |t CHAPTER 2: Database Design --   |t CHAPTER 3: Database Management and Administration --   |t CHAPTER 4: Database User Accounts --   |t CHAPTER 5: Database Privileges --   |t CHAPTER 6: Roles --   |t CHAPTER 7: Database Security Controls for Confidentiality --   |t CHAPTER 8: Transactions for Data Integrity --   |t CHAPTER 9: Data Integrity with Concurrent Access --   |t Appendix --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database security considers and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach. Each chapter also has a set of questions and follow up projects to reinforce comprehension of the material. FEATURES:Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows) to be applicable for nearly every student and professionalEnd of chapter exercises to enhance comprehension of topics 
530 |a Issued also in print. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023) 
650 0 |a Computer security. 
650 0 |a Database security. 
650 4 |a Data. 
650 4 |a E-Commerce. 
650 4 |a IT Management & Security. 
650 7 |a COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce).  |2 bisacsh 
653 |a Linux/UNIX. 
653 |a MacOS. 
653 |a Microsoft SQL Server. 
653 |a MySQL. 
653 |a Oracle. 
653 |a Windows. 
653 |a computer science. 
653 |a cybersecurity. 
653 |a data analytics. 
653 |a data science. 
653 |a database normalization. 
653 |a e-commerce. 
653 |a referential integrity. 
653 |a transactions. 
776 0 |c EPUB  |z 9781683926610 
776 0 |c print  |z 9781683926634 
856 4 0 |u https://www.degruyter.com/isbn/9781683926627 
856 4 2 |3 Cover  |u https://www.degruyter.com/document/cover/isbn/9781683926627/original 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_DGALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles 
912 |a PDA12STME 
912 |a PDA13ENGE 
912 |a PDA18STMEE 
912 |a PDA5EBK