Higher Education

shoe image

Database Security and Auditing: Protecting Data Integrity and Accessibility

Author(s): Hassan A. Afyouni

ISBN: 9789366603506

1st Edition

Copyright: 2006

India Release: 2025

₹675

Binding: Paperback

Pages: 448

Trim Size: 241 x 181 mm

Refer Book

Order Inspection Copy

THE COST OF DATA LOSS IS RISING progressively every year. Companies are losingdata due to malicious attacks and improper implementation of database security and auditing. Data integrity and accessibility must be protected in order to ensure the company operability. This book is designed to provide the reader with an understanding of security concepts and practices in general and those specific to database security in a highly detailed implementation. Not only will the reader gain a good understanding of database security, the reader will be shown how to develop database applications embedding from simple to sophisticated security and auditing models using Oracle10g and Microsoft SQL Server 2000.

  • Chapter Objectives. Each chapter begins with a detailed list of the concepts to be mastered within that chapter.
  • Illustrations and Tables. Numerous illustrations of security and auditing concepts and models are presented supplement text discussion. In addition, the many tables provide details of database objects presented in this book as well as some of the practical and theoretical information.
  • Hands-On Projects.. Each chapter provides includes several Hands-On Projects aimed at providing you with practical implementation of concepts and scenarios covered in each chapter. These projects cover both Oracle10g and Microsoft SQL Server 2000.
  • Chapter Summaries. Each chapter’s text is followed by a summary of the concepts introduced in that chapter. These summaries provide a helpful way to review the ideas covered in each chapter.
  • Review Questions. The end-of-chapter assessment begins with a set of review questions that reinforce the ideas introduced in each chapter. These questions help you evaluate and apply the material you have learned.
  • Case Projects. Located at the end of each chapter are Case Projects. In these extensive exercises, you implement the skills and knowledge gained in the chapter through real design and implementation scenarios.
  • Glossary. For easy reference, a glossary at the end of the book lists the key terms in alphabetical order along with definitions.
  • Step-by-step demonstrations. These are essential components of the book illustrating in detail how to implement most of the concepts presented in each chapter.
  • Scenarios. Embedded within the chapter text, scenarios are very helpful in relating the concepts to real life situations.
  1. Security Architecture
  2. Operating System Security Fundamentals
  3. Administration of Users
  4. Profiles, Password Policies, Privileges, and Roles
  5. Database Application Security Models
  6. Virtual Private Databases
  7. Database Auditing Models
  8. Application Data Auditing
  9. Auditing Database Activities
  10. Security and Auditing Project Cases

Hassan A. Afyouni

Hassan A. Afyouni has been working in the information technology field as a consultant for over fifteen years as database developer, database architect, database administrator, and data architect.