|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn476038523 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr mn|---||||| |
008 |
091207s2005 vtu o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d NRU
|d OCLCQ
|d UKDOC
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d ZCU
|d MERUC
|d ICG
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9780080470641
|q (electronic bk.)
|
020 |
|
|
|a 0080470645
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000048750723
|
029 |
1 |
|
|a DEBBG
|b BV044122853
|
029 |
1 |
|
|a DEBSZ
|b 430376960
|
029 |
1 |
|
|a DEBSZ
|b 449090000
|
035 |
|
|
|a (OCoLC)476038523
|
050 |
|
4 |
|a QA76.9.A25 B45 2005eb
|
082 |
0 |
4 |
|a 005.8 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Natan, Ron Ben.
|
245 |
1 |
0 |
|a Implementing Database Security and Auditing.
|
260 |
|
|
|a Burlington :
|b Elsevier,
|c 2005.
|
300 |
|
|
|a 1 online resource (433 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Securing application environments and databases is the major focus of information security this book will show you how to do it.
|
505 |
0 |
|
|a Front cover; copyright; Contents; front matter; Preface; body; 1. Getting Started; 2. Database Security within the General Security Landscape and a Defense- in- Depth Strategy; 3. The Database as a Networked Server; 4. Authentication and Password Security; 5. Application Security; 6. Using Granular Access Control; 7. Using the Database To Do Too Much; 8. Securing database- to- database communications; 9. Trojans; 10. Encryption; 11. Regulations and Compliance; 12. Auditing Categories; 13. Auditing Architectures; Index.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Database security.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Database security
|2 fast
|
776 |
1 |
|
|z 9781555583347
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=286701
|z Texto completo
|
938 |
|
|
|a 123Library
|b 123L
|n 38580
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL286701
|
994 |
|
|
|a 92
|b IZTAP
|