An all-encompassing guide to securing your database andapplications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48million, organizations are desperate for qualified databaseadministrators and software professionals. Hackers are moreinnovative than ever b
Database and Application Security: A Practitioner's Guide
β Scribed by R. Sarma Danturthi
- Publisher
- Addison-Wesley Professional
- Year
- 2024
- Tongue
- English
- Leaves
- 448
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
An all-encompassing guide to securing your database and applications against costly cyberattacks!
In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative than ever before. Increased cybercrime means front-end applications and back-end databases must be finetuned for a strong security posture. Database and Application Security: A Practitioner's Guide is the resource you need to better fight cybercrime and become more marketable in an IT environment that is short on skilled cybersecurity professionals.
In this extensive and accessible guide, Dr. R. Sarma Danturthi provides a solutions-based approach to help you master the tools, processes, and methodologies to establish security inside application and database environments. It discusses the STIG requirements for third-party applications and how to make sure these applications comply to an organizationβs security posture. From securing hosts and creating firewall rules to complying with increasingly tight regulatory requirements, this book will be your go-to resource to creating an ironclad cybersecurity database.
In this guide, you'll find:
- Tangible ways to protect your company from data breaches, financial loss, and reputational harm
- Engaging practice questions (and answers) after each chapter to solidify your understanding
- Key information to prepare for certifications such as Sec+, CISSP, and ITIL
- Sample scripts for both Oracle and SQL Server software and tips to secure your code
- Advantages of DB back-end scripting over front-end hard coding to access DB
- Processes to create security policies, practice continuous monitoring, and maintain proactive security postures
Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
π SIMILAR VOLUMES
<P>Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, <B>Securing Cloud and Mobility: A Practitioner's Guide </B>explains how to secure the multifaceted layers of private and public cloud deployments as well as mo
<P><b>Section 1: Introduction to Big Data </b>Chapter 1 -- An Introduction to Big Data Chapter 2 -- Drilling into the Big Data Goldmine: Data Fusion and High Performance Analytics for Intelligence Professionals</p> <p><b>Section 2: Core Concepts and Application Scenarios</b></p> <p>Chapter 3 -- Harn
<p><i>Application of Big Data for National Security </i>provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an int