29,99 €
29,99 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
29,99 €
29,99 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
Als Download kaufen
29,99 €
inkl. MwSt.
Sofort per Download lieferbar
payback
0 °P sammeln
Jetzt verschenken
29,99 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
0 °P sammeln
  • Format: ePub

This book provides a comprehensive guide to resolving database security issues during design, implementation, and production phases. It emphasizes specific measures and controls unique to database security, beyond general information security. Topics include account credential management, data access management, and techniques like database normalization, referential integrity, transactions, locks, and check constraints.
The importance of database security lies in protecting sensitive data from unauthorized access and ensuring data integrity. This book is designed for professionals,
…mehr

  • Geräte: eReader
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 18.06MB
  • FamilySharing(5)
Produktbeschreibung
This book provides a comprehensive guide to resolving database security issues during design, implementation, and production phases. It emphasizes specific measures and controls unique to database security, beyond general information security. Topics include account credential management, data access management, and techniques like database normalization, referential integrity, transactions, locks, and check constraints.
The importance of database security lies in protecting sensitive data from unauthorized access and ensuring data integrity. This book is designed for professionals, workshops, and self-learners, offering hands-on demonstrations with major Database Management Systems (MySQL, Oracle, and Microsoft SQL Server) across various computing platforms (Linux/UNIX, MacOS, Windows).
Starting with an introduction to information, data, and database security, the book covers database design, management, administration, user accounts, privileges, roles, and security controls for confidentiality. It also delves into transactions and data integrity with concurrent access. Each chapter includes questions and projects to reinforce learning and comprehension.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.