02835nam 2200601Ia 450 991045145210332120200520144314.01-280-96449-997866109644990-08-047064-5(CKB)1000000000341470(EBL)286701(OCoLC)476038523(SSID)ssj0000177178(PQKBManifestationID)11201805(PQKBTitleCode)TC0000177178(PQKBWorkID)10209945(PQKB)10443432(MiAaPQ)EBC286701(Au-PeEL)EBL286701(CaPaEBR)ebr10167037(CaONFJC)MIL96449(EXLCZ)99100000000034147020050225d2005 uy 0engur|n|---|||||txtccrImplementing database security and auditing[electronic resource] /Roy [i.e. Ron] Ben NatanBoston Digital Press20051 online resource (433 p.)Description based upon print version of record.1-55558-334-2 Includes bibliographical references and index.front cover; copyright; Contents; front matter; Preface; body; 1. Getting Started; 2. Database Security within the General Security Landscape and a Defense- in- Depth Strategy; 3. The Database as a Networked Server; 4. Authentication and Password Security; 5. Application Security; 6. Using Granular Access Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9. Trojans; 10. Encryption; 11. Regulations and Compliance; 12. Auditing Categories; 13. Auditing Architectures; IndexThis book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to aComputer securityData protectionDatabase securityElectronic books.Computer security.Data protection.Database security.005.8Ben-Natan Ron544573MiAaPQMiAaPQMiAaPQBOOK9910451452103321Implementing database security and auditing1212820UNINA