Database security and auditing : protecting data integrity and accessibility / Hassan A. Afyouni.

By: Afyouni, Hassan AMaterial type: TextTextPublisher: Boston, Mass. : Thomson/Course Technology, c2006Description: xviii, 429 p. : ill. ; 24 cmISBN: 0619215593 (pbk.); 9780619215590 (pbk.)Subject(s): Database security | Database managementAdditional physical formats: Online version:: Database security and auditing.DDC classification: 005.8 LOC classification: QA76.9.D314 | A39 2006
Contents:
Security Architecture -- Chp. 2. Operating System Security Fundamentals -- Chp. 3. Administration of Users -- Chp. 4. Profiles, Password Policies, Privileges, and Roles -- Chp. 5. Database Auditing Models -- Chp. 6. Virtual Private Databases -- pt. 2. Chp. 7. Data Auditing Models -- Chp. 8. Application Data Auditing -- Chp. 9. Auditing Database Activities -- pt. 3. Chp. 10. Security and Auditing Project Cases.
Summary: Designed for easy learning, this text is broken into three sections: security, auditing and implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Call number Copy number Status Notes Date due Barcode
Books Books Female Library
QA76.9 .D314 A39 2006 (Browse shelf (Opens below)) 1 Available STACKS 51952000175537
Books Books Main Library
QA76.9 .D314 A39 2006 (Browse shelf (Opens below)) 1 Available STACKS 51952000157359

Includes index.

Introduction -- pt. 1. Chp. 1. Security Architecture -- Chp. 2. Operating System Security Fundamentals -- Chp. 3. Administration of Users -- Chp. 4. Profiles, Password Policies, Privileges, and Roles -- Chp. 5. Database Auditing Models -- Chp. 6. Virtual Private Databases -- pt. 2. Chp. 7. Data Auditing Models -- Chp. 8. Application Data Auditing -- Chp. 9. Auditing Database Activities -- pt. 3. Chp. 10. Security and Auditing Project Cases.

Designed for easy learning, this text is broken into three sections: security, auditing and implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text.

1 2

There are no comments on this title.

to post a comment.