Database security and auditing : protecting data integrity and accessibility / Hassan A. Afyouni.
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | QA76.9 .D314 A39 2006 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000175537 | |
![]() |
Main Library | QA76.9 .D314 A39 2006 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000157359 |
Browsing Main Library shelves Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
QA76.9 .D3 W448 2006 Everyday Oracle DBA / | QA76.9 .D3 W46 2009 Picture yourself learning Microsoft Access 2007 / | QA76.9 .D3 W6642 2007 Beginning SQL server 2005 administration / | QA76.9 .D314 A39 2006 Database security and auditing : protecting data integrity and accessibility / | QA76.9 .D32 O67 2004 Databases demystified / | QA76.9 .D32 O67 2004 Databases demystified / | QA76.9 .D32 O67 2004 Databases demystified / |
Includes index.
Introduction -- pt. 1. Chp. 1. Security Architecture -- Chp. 2. Operating System Security Fundamentals -- Chp. 3. Administration of Users -- Chp. 4. Profiles, Password Policies, Privileges, and Roles -- Chp. 5. Database Auditing Models -- Chp. 6. Virtual Private Databases -- pt. 2. Chp. 7. Data Auditing Models -- Chp. 8. Application Data Auditing -- Chp. 9. Auditing Database Activities -- pt. 3. Chp. 10. Security and Auditing Project Cases.
Designed for easy learning, this text is broken into three sections: security, auditing and implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text.
1 2
There are no comments on this title.