Synopses & Reviews
Designed for easy learning, this text is broken into three sections: Security, Auditing and Implementation. Students will fully understand how to implement database security on modern business databases using practical scenarios and step-by-step examples throughout the text. Each chapter ends with exercises and a hands-on project to reinforce and showcase the topics learned. The final chapter of the book allows the students to apply their knowledge in a presentation of four real-world cases using security and auditing.
This groundbreaking approach to database security will prepare students for business applications in a non-database specific environment.
About the Author
Hassan A. Afyouni has been working in the information technology field as a consultant for over 15 years as database developer, database architect, database administrator, and data architect. He has been an instructor at several universities in Canada and the U.S., a corporate trainer for some major corporations, and a curriculum developer for various courses and programs.
Table of Contents
1. Security Architecture 2. Operating System Security Fundamentals 3. Administration of Users 4. Profiles, Password Policies, Privileges, and Roles 5. Database Application Security Models 6. Virtual Private Databases 7. Database Auditing Models 8. Application Data Auditing 9. Auditing Database Activities 10. Security and Auditing Project Cases Appendix A: Database Security Checklist Appendix B: Database Auditing Checklist