Название: Database Security: Problems and Solutions Автор: Christopher Diaz Издательство: Mercury Learning and Information Год: 2022 Страниц: 261 Язык: английский Формат: pdf (true), epub (true) Размер: 24.0 MB
Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database securityconsiders and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach. Each chapter also has a set of questions and follow up projects to reinforce comprehension of the material.
Database security and information security may sound like similar concepts, but they are different in perspective and coverage. Database security does involve the information security principles of confidentiality, integrity, and availability. However, database security considers and implements those security measures or controls in more specific ways than are generally realized in the broader realm of information security. For example, to uphold the principle of confidentiality, we often turn to the information security control of encryption. But database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. These are among the topics that we cover in Chapters 1, 3, 4, 5, 6, and 7.
To uphold the principle of integrity, we often consider the information security controls of hashing or digital signatures. With database security, in addition to those techniques we must also consider other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints, all of which are some of the topics we cover in Chapters 1, 2, 7, 8, and 9. Last but not least, to uphold the principle of availability we likewise discuss a variety of approaches in Chapters 1, 3, and 9.
FEATURES:
Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows) to be applicable for nearly every student and professional End of chapter exercises to enhance comprehension of topics
The audiences for this textbook include professionals and self-learners, as well as classroom or workshop settings. The concepts presented in the text are demonstrated against databases that are provided, so that one can follow along in a hands-on approach and better learn these concepts.
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.