Security leaks, and finding them, is getting immensely popular. Leaking private data and creating security leaks in publicly accessible systems is getting easier and easier; the tricks used to break those systems and expose the data in them are getting more complex. There is a big need for knowledge, specific to securing both MySQL server installations and software written on top of the MySQL database system. Building and running a secure MySQL-based system requires specific knowledge of techniques in programming, networking, system administration, and database systems.
The MySQL Security handbook provides an insight into the philosophy behind MySQL security, aided by practical examples. Both the viewpoints of the 'builder' and the 'abuser' are explained and shown. When reading the book from cover to cover, the reader should have a working knowledge of what possible problems to look out for, while being able to use it as a useful reference for specific day-to-day tasks. As MySQL is popularly used in combination with Perl and PHP scripting languages, examples are shown for these; solutions for these problems will be kept as generic as possible, but will be focused on PHP and Perl. The coverage will include (although not limited to) 'Setting Up a secure MySQL system', 'Tightening The Screws', 'MySQL Management','a look Under The Hood','Practical Privileges','Keeping it Safe From The Start', and 'Secure Coding - In Practice'.
This book has been completely reviewed by the technical team at MySQL AB, which directly means that the information presented is extremely useful, of the highest quality, and reliable.