000 -LEADER |
fixed length control field |
01796cam a2200313Ia 4500 |
001 - CONTROL NUMBER |
control field |
u9038 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SA-PMU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210418123310.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
050603s2006 maua 001 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
SISPL |
Language of cataloging |
eng |
Transcribing agency |
SISPL |
Modifying agency |
OCL |
-- |
BAKER |
-- |
UAB |
-- |
YDXCP |
-- |
BTCTA |
-- |
AU@ |
-- |
NRAMU |
-- |
Z@L |
-- |
OCLCQ |
-- |
TULIB |
-- |
OCLCF |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0619215593 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780619215590 (pbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)60549171 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.D314 |
Item number |
A39 2006 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Afyouni, Hassan A. |
245 10 - TITLE STATEMENT |
Title |
Database security and auditing : |
Remainder of title |
protecting data integrity and accessibility / |
Statement of responsibility, etc. |
Hassan A. Afyouni. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boston, Mass. : |
Name of publisher, distributor, etc. |
Thomson/Course Technology, |
Date of publication, distribution, etc. |
c2006. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 429 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
505 00 - FORMATTED CONTENTS NOTE |
Miscellaneous information |
Introduction -- pt. 1. Chp. 1. |
Title |
Security Architecture -- Chp. 2. |
-- |
Operating System Security Fundamentals -- Chp. 3. |
-- |
Administration of Users -- Chp. 4. |
-- |
Profiles, Password Policies, Privileges, and Roles -- Chp. 5. |
-- |
Database Auditing Models -- Chp. 6. |
-- |
Virtual Private Databases -- pt. 2. Chp. 7. |
-- |
Data Auditing Models -- Chp. 8. |
-- |
Application Data Auditing -- Chp. 9. |
-- |
Auditing Database Activities -- pt. 3. Chp. 10. |
-- |
Security and Auditing Project Cases. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Designed for easy learning, this text is broken into three sections: security, auditing and implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text. |
596 ## - |
-- |
1 2 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Database security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Database management. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Online version: |
Main entry heading |
Afyouni, Hassan A. |
Title |
Database security and auditing. |
Place, publisher, and date of publication |
Boston, Mass. : Thomson/Course Technology, c2006 |
Record control number |
(OCoLC)680584579 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
994 ## - |
-- |
Z0 |
-- |
SUPMU |