Ben-Natan R.1555582877, 1555582885, 1555583059, 1555583229
This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing – including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have sincebeen fixed). These will often be explained to an “internals” level. There are many sections which outline the “anatomy of an attack” – before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape – both from a business and regulatory requirements perspective as well as from a technical implementation perspective. |
Table of contents : Cover……Page 1 Contents……Page 8 1 Getting Started……Page 20 2 Database Security within the General SecurityLandscape and a Defense-in-Depth Strategy……Page 54 3 The Database as a Networked Server……Page 80 4 Authentication and Password Security……Page 114 5 Application Security……Page 146 6 Using Granular Access Control……Page 196 7 Using the Database To Do Too Much……Page 222 8 Securing database-to-database communications……Page 252 9 Trojans……Page 286 10 Encryption……Page 316 11 Regulations and Compliance……Page 346 12 Auditing Categories……Page 368 13 Auditing Architectures……Page 394 Index……Page 416 |
Reviews
There are no reviews yet.