O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Programmatic Security

Programmatic security simply requires that credentials be entered before permitting access to data. Most database applications permit the assignment of a user ID and password to users who need to access data. You are even permitted to indicate the role that a particular user may have, and which tables and even which rows in a table a user can access. These database features are only useful if there is a set of procedures in place to take advantage of them. Consider these points for controlling access to a database:

  • The complexity of passwords

  • The lifetime of passwords

  • The roles that will be defined for your database

  • The level of access permitted for each role

    • Indicate whether the role can read, update, or delete data

    • Indicate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required