Database Security: Problems and Solutions

  • 3h 52m
  • Christopher Diaz
  • Mercury Learning
  • 2022

Database Security: Problems and Solutions describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Database securityconsiders and implements those measures or controls in more specific ways than are generally realized in the broader realm of information security. Database security also involves other confidentiality approaches, such as techniques for account credential management, techniques to manage access to data, as well as techniques to manage the types of access. Database security also considers other, less realized, approaches such as database normalization, referential integrity, transactions, locks, and check constraints. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach. Each chapter also has a set of questions and follow up projects to reinforce comprehension of the material.

FEATURES:

  • Includes demonstration and solution implementations on the major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) and computing platforms (Linux/UNIX, MacOS, Windows) to be applicable for nearly every student and professional
  • End of chapter exercises to enhance comprehension of topics

About the Author

Christopher Diaz holds a PhD in computer science and is currently an associate professor and curriculum design specialist at Seton Hill University (PA). He has extensive industry experience as a systems engineer and has published books and articles in various areas of computer science.

In this Book

  • Preface
  • Introduction to Information Security, Data Security, and Database Security
  • Database Design
  • Database Management and Administration
  • Database User Accounts
  • Database Privileges
  • Roles
  • Database Security Controls for Confidentiality
  • Transactions for Data Integrity
  • Data Integrity with Concurrent Access
  • Appendix—End of Chapter Exercises
SHOW MORE
FREE ACCESS