Implementing Database Security and Auditing - Ron Ben-Natan - Librairie Eyrolles
Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Implementing Database Security and Auditing
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Implementing Database Security and Auditing

Implementing Database Security and Auditing

Ron Ben-Natan - Collection Security

430 pages, parution le 04/08/2005

Résumé

This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to an "internals" level. There are many sections which outline the "anatomy of an attack" - before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape - both from a business and regulatory requirements perspective as well as from a technical implementation perspective.

L'auteur - Ron Ben-Natan

Ron Ben Natan is CTO at Guardium, a leader in database security and auditing. Prior to Guardium Ron worked for companies such as Intel, AT & T Bell Laboratories, Merrill Lynch, J.P. Morgan and ViryaNet. He holds a Ph.D. in the field of distributed computing from the University of Jerusalem. Ron is an expert on the subject of distributed application environments, application security and database security and has authored nine technical books and numerous articles on these topics.

Sommaire

  • Getting Started
  • Database Security within the General Security
  • Landscape and a Defense-in-Depth Strategy
  • The Database as a Networked Server
  • Authentication and Password Security
  • Application Security
  • Using Granular Access Control
  • Using the Database To Do Too Much
  • Securing database-to-database communications
  • Trojans
  • Encryption
  • Regulations and Compliance
  • Auditing Categories
  • Auditing Architectures
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Digital Press, Elsevier
Auteur(s) Ron Ben-Natan
Collection Security
Parution 04/08/2005
Nb. de pages 430
Format 19 x 23
Couverture Broché
Poids 890g
Intérieur Noir et Blanc
EAN13 9781555583347
ISBN13 978-1-55558-334-7

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription