Free Shipping Anywhere in the World

Shop over 1 Million Toys in our Huge New Range

Database Security
By

Rating

Product Description
Product Details

Table of Contents

1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.

About the Author

Alfred Basta, PhD, is a professor of mathematics, cryptography, and information security as well as a professional speaker on topics in Internet security, networking, and cryptography. He is a member of many associations including the Mathematical Association of America. Dr. Basta's other publications include MATHEMATICS FOR INFORMATION TECHNOLOGY, LINUX OPERATIONS AND ADMINISTRATION, and DATABASE SECURITY. Melissa Zgola is a Professor of Network Technology, Information Security, and Software Architecture. She is a member of A.C.M.'s Special Interest Group for Information Technology Education as well as the Information System Security Association.

Reviews

1. Security and Information Technology. 2. Database Review. 3. Database Installation: MySQL. 4. Database Installation: SQL Server. 5. Database Installation: Oracle. 6. Passwords, Profiles, Privileges, and Roles. 7. SQL Injection I: Identification. 8. SQL Injection II: Exploitation and Defense. 9. Database Security Auditing. 10. Database Security Testing.

Ask a Question About this Product More...
Write your question below:
Look for similar items by category
Home » Books
Home » Books » Computers » Security » Networking
Home » Books » Computers » Networking » General
Item ships from and is sold by Fishpond World Ltd.
Back to top