前言
第1章 數(shù)據(jù)管理安全..........................................1
1.1 數(shù)據(jù)庫安全機制概論................................................1
1.2 賬號管理..............................................................4
1.3 登錄名管理...........................................................6
1.4 用戶管理..............................................................11
1.5 架構管理..............................................................14
1.6 用戶權限..............................................................17
1.7 角色管理..............................................................24
1.8 數(shù)據(jù)加密..............................................................31
1.9 SQL注入攻擊.......................................................37
第2章 數(shù)據(jù)文件安全..........................................40
2.1 數(shù)據(jù)文件安全簡介...................................................40
2.2 數(shù)據(jù)庫的備份與恢復...............................................41
2.3 數(shù)據(jù)文件的轉移.....................................................48
2.4 數(shù)據(jù)庫快照...........................................................50
2.5 數(shù)據(jù)庫鏡像...........................................................52
2.6 日志傳送..............................................................59
2.7 數(shù)據(jù)庫群集...........................................................66
第3章 Web應用安全..........................................69
3.1 Web開發(fā)三層架構.................................................69
3.2 Web安全............................................................78
3.3 SQL注入攻擊及其解決方案.....................................79
3.4 XSS攻擊及其解決方案...........................................105
第4章 Web應用安全綜合實踐..........................126
4.1 使用BackTrack對Web應用主機進行滲透測試.........126
4.2 加固Web應用主機的系統(tǒng).......................................136
4.3 通過WAF(含經典防火墻)配置
對Web應用主機的安全防護....................................138
參考文獻...................................................................185