Terdapat indeks. Table of contents: 1. Getting started 2. Database security within the general security landscape and a defense-in-depth strategy 3. The database as a networked server 4. Authentication and password security 5. Application security 6. Using granular access control 7. Using the database to do too much 8. Securing database-to-database communications 9. Trojans 10. Enc…