Database security and auditing : (Record no. 2478)

000 -LEADER
fixed length control field 01796cam a2200313Ia 4500
001 - CONTROL NUMBER
control field u9038
003 - CONTROL NUMBER IDENTIFIER
control field SA-PMU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210418123310.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 050603s2006 maua 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency SISPL
Language of cataloging eng
Transcribing agency SISPL
Modifying agency OCL
-- BAKER
-- UAB
-- YDXCP
-- BTCTA
-- AU@
-- NRAMU
-- Z@L
-- OCLCQ
-- TULIB
-- OCLCF
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0619215593 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780619215590 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)60549171
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.D314
Item number A39 2006
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Afyouni, Hassan A.
245 10 - TITLE STATEMENT
Title Database security and auditing :
Remainder of title protecting data integrity and accessibility /
Statement of responsibility, etc. Hassan A. Afyouni.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston, Mass. :
Name of publisher, distributor, etc. Thomson/Course Technology,
Date of publication, distribution, etc. c2006.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 429 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes index.
505 00 - FORMATTED CONTENTS NOTE
Miscellaneous information Introduction -- pt. 1. Chp. 1.
Title Security Architecture -- Chp. 2.
-- Operating System Security Fundamentals -- Chp. 3.
-- Administration of Users -- Chp. 4.
-- Profiles, Password Policies, Privileges, and Roles -- Chp. 5.
-- Database Auditing Models -- Chp. 6.
-- Virtual Private Databases -- pt. 2. Chp. 7.
-- Data Auditing Models -- Chp. 8.
-- Application Data Auditing -- Chp. 9.
-- Auditing Database Activities -- pt. 3. Chp. 10.
-- Security and Auditing Project Cases.
520 ## - SUMMARY, ETC.
Summary, etc. Designed for easy learning, this text is broken into three sections: security, auditing and implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text.
596 ## -
-- 1 2
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Database security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Database management.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Online version:
Main entry heading Afyouni, Hassan A.
Title Database security and auditing.
Place, publisher, and date of publication Boston, Mass. : Thomson/Course Technology, c2006
Record control number (OCoLC)680584579
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
994 ## -
-- Z0
-- SUPMU
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type Public note
          Female Library Female Library 04/18/2021   QA76.9 .D314 A39 2006 51952000175537 04/15/2021 1 04/15/2021 Books STACKS
          Main Library Main Library 04/18/2021   QA76.9 .D314 A39 2006 51952000157359 04/15/2021 1 04/15/2021 Books STACKS