Designed for easy learning, this text is broken into three sections: Security, Auditing and Implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text. Each chapter ends with exercises and a hands-on project to reinforce and showcase the topics learned. The final chapter of the book allows the students to apply their knowledge in a presentation of four real-world cases...
Designed for easy learning, this text is broken into three sections: Security, Auditing and Implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text. Each chapter ends with exercises and a hands-on project to reinforce and showcase the topics learned. The final chapter of the book allows the students to apply their knowledge in a presentation of four real-world cases using security and auditing.
1. Security Architecture 2.Operating System Security Fundamentals 3.Administration of Users 4.Profiles, Password Policies, Privileges, and Roles 5.Database Application Security Models 6.Virtual Private Databases 7.Database Auditing Models 8.Application Data Auditing 9.Auditing Database Activities 10.Security and Auditing Project Cases Appendix A: Database Security Checklist Appendix B: Database Auditing Checklist