CHAPTER 29Securing MySQL
It's almost a natural reaction: when exiting your home or automobile, you take a moment to lock the doors and set the alarm, if you have one. You do so because you know that the possibility of items being stolen dramatically increases if you do not take such rudimentary yet effective precautions. Ironically, the IT industry at large seems to take the opposite approach, as both IT systems and applications are prone to intellectual property theft, damage, and even destruction. What's even more alarming is the prevalence of such mishaps not because the technology does not offer deterrent features, but simply because the developers never bothered to put these deterrents into effect.
Note Malicious attack isn't the only ...
Get Beginning PHP and MySQL: From Novice to Professional, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.