Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
26,074
result(s) for
"Database security."
Sort by:
Hands-On Cybersecurity with Blockchain
by
Gupta, Rajneesh
in
Blockchains (Databases)
,
COM018000 COMPUTERS / Data Processing
,
COM053000 COMPUTERS / Security / General
2018
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.
Decentralized computing using blockchain technologies and smart contracts : emerging research and opportunities
\"This book explores how blockchain technology is a decentralized immutable data storage technology built on the concept of distributed consensus ledger. This book discusses how the distributed consensus ledger of block chain technology will have a major role in governance with its upcoming innovations in Public Notary Services, Voting Systems, Citizen Identity Services, Passport Registration, Migration Services\"-- Provided by publisher.
Ultimate Blockchain Security Handbook
by
Taha Sajid
2023
KEY FEATURES - An in-depth examination of the security aspects of Bitcoin, Ethereum, and Hyperledger Fabric.- Comprehensive coverage of smart contract vulnerabilities, attack analysis, and effective security measures.- Leverage Blockchain Risk Management Framework for managing risks associated with blockchain technology- Practical insights into testing and assessing the security of blockchain applications.- Strategies and solutions for robust access control using blockchain-based identity and access management.- Expert insights on identifying and categorizing risks using advanced threat modeling techniques.
DESCRIPTIONThe Ultimate Blockchain Security Handbook will help you identify and remediate your Blockchain solution bugs before others do. Covering the latest threats and vulnerabilities, as well as effective mitigation strategies, it takes you on a journey from the security foundations of blockchain technology to implementing advanced security solutions for blockchain applications. It helps you identify, assess, and mitigate risks using a variety of tools and techniques, including threat modeling, penetration testing, vulnerability scanning, attack analysis, and security audits. It covers formal verification methods for testing smart contract code, with an application of the K semantic framework. It then explores a range of blockchain security solutions, including zero-knowledge proof architecture, access control design, establishment of robust public key infrastructures, and the implementation of security logging and monitoring tools to track activities effectively.
WHAT WILL YOU LEARN - Acquire proficiency in efficiently assessing and categorizing risks through comprehensive threat modeling exercises.- Learn to conduct thorough audits of smart contracts and blockchain applications using diverse tools, formal verification methods, and established frameworks.- Learn to design secure blockchain architectures by implementing cutting-edge techniques, including zero-knowledge proofs, access controls, PKI (Public Key Infrastructure), and robust security logging.- Learn to take appropriate actions when encountering cryptocurrency-related internet scams, ensuring a safer digital environment.
WHO IS THIS BOOK FOR?This book is tailored for blockchain developers, architects, security experts, software professionals, and researchers/cryptographers seeking in-depth knowledge of blockchain security. Whether you're building blockchain systems, strengthening security expertise, integrating blockchain into software, or delving into advanced research, this book equips you with essential skills and insights.
TABLE OF CONTENTS 1. Blockchain Security Overview2. Blockchain Security Variations3. Attack Vectors Management on Blockchain4. Blockchain Application Exploitation5. Blockchain Application Audit6. Blockchain Security Solution Index
Advancing database security: a comprehensive systematic mapping study of potential challenges
by
Iqbal, Asif
,
Ahmad, Aakash
,
Humayun, Mamoona
in
Access control
,
Communications Engineering
,
Computer Communication Networks
2024
The value of data to a company means that it must be protected. When it comes to safeguarding their local and worldwide databases, businesses face a number of challenges. To systematically review the literature to highlight the difficulties in establishing, implementing, and maintaining secure databases. In order to better understand database system problems, we did a systematic mapping study (SMS). We’ve analyzed 100 research publications from different digital libraries and found 20 issues after adopting inclusion and exclusion criteria. This SMS study aimed to identify the most up-to-date research in database security and the different challenges faced by users/clients using various databases from a software engineering perspective. In total, 20 challenges were identified related to database security. Our results show that “weak authorization system”, “weak access control”, “privacy issues/data leakage”, “lack of NOP security”, and “database attacks” as the most frequently cited critical challenges. Further analyses were performed to show different challenges with respect to different phases of the software development lifecycle, venue of publications, types of database attacks, and active research institutes/universities researching database security. The organizations should implement adequate mitigation strategies to address the identified database challenges. This research will also provide a direction for new research in this area.
Journal Article
Dynamic SQL : applications, performance, and security in Microsoft SQL Server
\"Take a deep dive into the many uses of dynamic SQL in Microsoft SQL server. This edition has been updated to use the newest features in SQL Server 2016 and SQL Server 2017 as well as incorporating the changing landscape of analytics and database administration. Code examples have been updated with new system objects and functions to improve efficiency and maintainability. Executing dynamic SQL is key to large-scale searching based on user-entered criteria. Dynamic SQL can generate lists of values and even code with minimal impact on performance. Dynamic SQL enables dynamic pivoting of data for business inteligence solutions as well as customizing of database objects. Yet dynamic SQL is feared by many due to concerns over SQL injection or code maintainability. \"Dynamic SQL : applications, performance, and security in Microsoft SQL Server\" helps you bring the productivity and user-satisfaction of flexible and responsive applications to your organization safely and securely. Your organization's increased ability to respond to rapidly changing business scenarios will build competitive advantage in an increasingly crowded and competitive global marketplace. With a focus on new applications and modern database architecture, this edition illustrates that dynamic SQL continues to evolve and be a valuable tool for administration, performance optimization, and analytics.\"--Provided by publisher
What is the real cost of a breach?
2020
WSJ's David Breg and Rob Sloan discuss how understanding the costs of a breach can help companies organize defenses and prioritize investments.
Streaming Video