Database and Application Security: A Practitioners Guide, 1st edition

Published by Addison-Wesley Professional (March 12, 2024) © 2024

  • R Sarma Danturthi
Products list

Access details

  • Digital eBook
  • Instant access
  • Available online, offline and via apps
  • Accessible through the VitalSource Bookshelf

Features

  • Sample scripts
  • Make highlights and notes
  • Listen as the Bookshelf reads to you
Products list

Title overview

An all-encompassing guide to securing your database and applications against costly cyberattacks!

In a time when the average cyber-attack costs a company $9.48 million, organisations are desperate for qualified database administrators and software professionals. Hackers are more innovative than ever before. Increased cybercrime means front-end applications and back-end databases must be finetuned for a strong security posture. Database and Application Security: A Practitioner's Guide is the resource you need to better fight cybercrime and become more marketable in an IT environment that is short on skilled cybersecurity professionals.

In this extensive and accessible guide, Dr. R. Sarma Danturthi provides a solutions-based approach to help you master the tools, processes, and methodologies to establish security inside application and database environments. It discusses the STIG requirements for third-party applications and how to make sure these applications comply to an organisation's security posture. From securing hosts and creating firewall rules to complying with increasingly tight regulatory requirements, this book will be your go-to resource to creating an ironclad cybersecurity database.

In this guide, you'll find:

  • Tangible ways to protect your company from data breaches, financial loss, and reputational harm
  • Engaging practice questions (and answers) after each chapter to solidify your understanding
  • Key information to prepare for certifications such as Sec+, CISSP, and ITIL
  • Sample scripts for both Oracle and SQL Server software and tips to secure your code
  • Advantages of DB back-end scripting over front-end hard coding to access DB
  • Processes to create security policies, practice continuous monitoring, and maintain proactive security postures

Table of contents

  • Part I. Security Fundamentals
  • Chapter 1. Basics of Cybersecurity
  • Chapter 2. Security Details
  • Chapter 3. Goals of Security
  • Part II. Database Security - The Back End
  • Chapter 4. Database Security Introduction
  • Chapter 5. Access Control of Data
  • Chapter 6. Data Refresh, Backup, and Restore
  • Chapter 7. Host Security
  • Chapter 8. Proactive Monitoring
  • Chapter 9. Risks, Monitoring, and Encryption
  • Part III. Application Security - The Front End
  • Chapter 10. Application Security Fundamentals
  • Chapter 11. The Unseen Back End
  • Chapter 12. Securing Software - In-House and Vendor
  • Part IV. Security Administration
  • Chapter 13. Security Administration
  • Chapter 14. Follow a Proven Path for Security
  • Chapter 15. Mobile Devices and Application Security
  • Chapter 16. Corporate Security in Practice

Need help?Get in touch