Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Implementing database security and auditing [electronic resource] : a guide for DBAs, information security administrators and auditors / Ron Ben Natan.

By: Ben-Natan, Ron.
Material type: TextTextPublisher: Burlington, MA : Elsevier Digital Press, c2005Description: 1 online resource (xvii, 413 p.) : ill.ISBN: 9780080470641 (electronic bk.); 0080470645 (electronic bk.).Subject(s): Computer security | Data protection | Database security | Syst�emes informatiques -- S�ecurit�e -- Mesures | Protection de l'information (Informatique) | Bases de donn�ees -- S�ecurit�e -- Mesures | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- GeneralGenre/Form: Electronic books.Additional physical formats: Print version:: Implementing database security and auditing.DDC classification: 005.8 Online resources: EBSCOhost
Contents:
Front cover; copyright; Contents; front matter; Preface; body; 1. Getting Started; 2. Database Security within the General Security Landscape and a Defense- in- Depth Strategy; 3. The Database as a Networked Server; 4. Authentication and Password Security; 5. Application Security; 6. Using Granular Access Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9. Trojans; 10. Encryption; 11. Regulations and Compliance; 12. Auditing Categories; 13. Auditing Architectures; Index;
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes index.

Description based on print version record.

Front cover; copyright; Contents; front matter; Preface; body; 1. Getting Started; 2. Database Security within the General Security Landscape and a Defense- in- Depth Strategy; 3. The Database as a Networked Server; 4. Authentication and Password Security; 5. Application Security; 6. Using Granular Access Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9. Trojans; 10. Encryption; 11. Regulations and Compliance; 12. Auditing Categories; 13. Auditing Architectures; Index;

There are no comments for this item.

Log in to your account to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter