𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Database and Application Security: A Practitioner's Guide

✍ Scribed by R. Sarma Danturthi


Publisher
Addison-Wesley Professional
Year
2024
Tongue
English
Leaves
448
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


An all-encompassing guide to securing your database and applications against costly cyberattacks!

In a time when the average cyberattack costs a company $9.48 million, organizations are desperate for qualified database administrators and software professionals. Hackers are more innovative than ever before. Increased cybercrime means front-end applications and back-end databases must be finetuned for a strong security posture. Database and Application Security: A Practitioner's Guide is the resource you need to better fight cybercrime and become more marketable in an IT environment that is short on skilled cybersecurity professionals.

In this extensive and accessible guide, Dr. R. Sarma Danturthi provides a solutions-based approach to help you master the tools, processes, and methodologies to establish security inside application and database environments. It discusses the STIG requirements for third-party applications and how to make sure these applications comply to an organization’s security posture. From securing hosts and creating firewall rules to complying with increasingly tight regulatory requirements, this book will be your go-to resource to creating an ironclad cybersecurity database.

In this guide, you'll find:

  • Tangible ways to protect your company from data breaches, financial loss, and reputational harm
  • Engaging practice questions (and answers) after each chapter to solidify your understanding
  • Key information to prepare for certifications such as Sec+, CISSP, and ITIL
  • Sample scripts for both Oracle and SQL Server software and tips to secure your code
  • Advantages of DB back-end scripting over front-end hard coding to access DB
  • Processes to create security policies, practice continuous monitoring, and maintain proactive security postures




Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.


πŸ“œ SIMILAR VOLUMES


Database and Application Security: A Pra
✍ R. Sarma Danturthi πŸ“‚ Library πŸ“… 2024 πŸ› Addison-Wesley 🌐 English

An all-encompassing guide to securing your database andapplications against costly cyberattacks! In a time when the average cyberattack costs a company $9.48million, organizations are desperate for qualified databaseadministrators and software professionals. Hackers are moreinnovative than ever b

Securing Cloud and Mobility: A Practitio
✍ Ian Lim, E. Coleen Coolidge, Paul Hourani πŸ“‚ Library πŸ“… 2013 πŸ› Auerbach Publications 🌐 English

<P>Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, <B>Securing Cloud and Mobility: A Practitioner's Guide </B>explains how to secure the multifaceted layers of private and public cloud deployments as well as mo

Application of big data for national sec
✍ Akhgar, Babak;Arabnia, Hamid;Bayerl, Petra;Hill, Richard;Saathoff, Gregory B.;St πŸ“‚ Library πŸ“… 2015 πŸ› Butterworth-Heinemann 🌐 English

<P><b>Section 1: Introduction to Big Data </b>Chapter 1 -- An Introduction to Big Data Chapter 2 -- Drilling into the Big Data Goldmine: Data Fusion and High Performance Analytics for Intelligence Professionals</p> <p><b>Section 2: Core Concepts and Application Scenarios</b></p> <p>Chapter 3 -- Harn

Application of Big Data for National Sec
✍ Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia, Richard Hill, Andrew Stanif πŸ“‚ Library πŸ“… 2015 πŸ› Butterworth-Heinemann 🌐 English

<p><i>Application of Big Data for National Security </i>provides users with state-of-the-art concepts, methods, and technologies for Big Data analytics in the fight against terrorism and crime, including a wide range of case studies and application scenarios. This book combines expertise from an int