000 | 01796cam a2200313Ia 4500 | ||
---|---|---|---|
001 | u9038 | ||
003 | SA-PMU | ||
005 | 20210418123310.0 | ||
008 | 050603s2006 maua 001 0 eng d | ||
040 |
_aSISPL _beng _cSISPL _dOCL _dBAKER _dUAB _dYDXCP _dBTCTA _dAU@ _dNRAMU _dZ@L _dOCLCQ _dTULIB _dOCLCF |
||
020 | _a0619215593 (pbk.) | ||
020 | _a9780619215590 (pbk.) | ||
035 | _a(OCoLC)60549171 | ||
050 | 4 |
_aQA76.9.D314 _bA39 2006 |
|
082 | 0 | 4 |
_a005.8 _222 |
100 | 1 | _aAfyouni, Hassan A. | |
245 | 1 | 0 |
_aDatabase security and auditing : _bprotecting data integrity and accessibility / _cHassan A. Afyouni. |
260 |
_aBoston, Mass. : _bThomson/Course Technology, _cc2006. |
||
300 |
_axviii, 429 p. : _bill. ; _c24 cm. |
||
500 | _aIncludes index. | ||
505 | 0 | 0 |
_gIntroduction -- pt. 1. Chp. 1. _tSecurity Architecture -- Chp. 2. _tOperating System Security Fundamentals -- Chp. 3. _tAdministration of Users -- Chp. 4. _tProfiles, Password Policies, Privileges, and Roles -- Chp. 5. _tDatabase Auditing Models -- Chp. 6. _tVirtual Private Databases -- pt. 2. Chp. 7. _tData Auditing Models -- Chp. 8. _tApplication Data Auditing -- Chp. 9. _tAuditing Database Activities -- pt. 3. Chp. 10. _tSecurity and Auditing Project Cases. |
520 | _aDesigned for easy learning, this text is broken into three sections: security, auditing and implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text. | ||
650 | 0 | _aDatabase security. | |
650 | 0 | _aDatabase management. | |
776 | 0 | 8 |
_iOnline version: _aAfyouni, Hassan A. _tDatabase security and auditing. _dBoston, Mass. : Thomson/Course Technology, c2006 _w(OCoLC)680584579 |
942 | _cBOOK | ||
994 |
_aZ0 _bSUPMU |
||
596 | _a1 2 | ||
999 |
_c2478 _d2478 |