๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Implementing Database Security and Auditing

โœ Scribed by Ben-Natan R.


Year
2005
Tongue
English
Leaves
433
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have sincebeen fixed). These will often be explained to an "internals" level. There are many sections which outline the "anatomy of an attack" - before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape - both from a business and regulatory requirements perspective as well as from a technical implementation perspective.

โœฆ Table of Contents


Cover......Page 1
Contents......Page 8
1 Getting Started......Page 20
2 Database Security within the General SecurityLandscape and a Defense-in-Depth Strategy......Page 54
3 The Database as a Networked Server......Page 80
4 Authentication and Password Security......Page 114
5 Application Security......Page 146
6 Using Granular Access Control......Page 196
7 Using the Database To Do Too Much......Page 222
8 Securing database-to-database communications......Page 252
9 Trojans......Page 286
10 Encryption......Page 316
11 Regulations and Compliance......Page 346
12 Auditing Categories......Page 368
13 Auditing Architectures......Page 394
Index......Page 416


๐Ÿ“œ SIMILAR VOLUMES


Implementing Database Security and Audit
โœ Ron Ben Natan ๐Ÿ“‚ Library ๐Ÿ“… 2005 ๐ŸŒ English

This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for database

Relational Database Design and Implement
โœ Jan L. Harrington ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Morgan Kaufmann ๐ŸŒ English

<p><i>Relational Database Design and Implementation: Clearly Explained, Fourth Edition</i>, provides the conceptual and practical information necessary to develop a database design and management scheme that ensures data accuracy and user satisfaction while optimizing performance. </p> <p>Database s

Relational Database Design and Implement
โœ Jan L. Harrington ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Morgan Kaufmann ๐ŸŒ English

<p><i>Relational Database Design and Implementation: Clearly Explained, Fourth Edition</i>, provides the conceptual and practical information necessary to develop a database design and management scheme that ensures data accuracy and user satisfaction while optimizing performance. </p> <p>Database s

Relational Database Design and Implement
โœ Harrington, Jan L ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science;Morgan Kaufmann ๐ŸŒ English

Fully revised, updated, and expanded, Relational Database Design and Implementation, Third Edition is the most lucid and effective introduction to the subject available for IT/IS professionals interested in honing their skills in database design, implementation, and administration. This book provide