Chapter 10. Security
Keeping
MySQL secure is critical to maintaining the integrity and privacy of
your data. Just as you have to protect Unix or Windows login
accounts, you need to ensure that MySQL accounts have good passwords
and only the privileges they need. Because MySQL is often used on a
network, you also need to consider the security of the host that runs
MySQL, who has access to it, and what someone could learn by sniffing
traffic on your network.In this chapter we'll look at how
MySQL's permissions work and how you can keep
control of who has access to the data. We'll also
consider some of the basic operating system and network security
measures you can employ to keep the bad guys out of your databases.
Finally, we'll discuss encryption and running MySQL
in a highly restricted environment.
• Table of Contents
• Index
• Reviews
• Reader Reviews
• Errata
• Academic
High Performance MySQL
By
Derek J. Balling, Jeremy Zawodny
Publisher: OReilly
Pub Date: April 2004
ISBN: 0-596-00306-4
Pages: 294
Slots: 1.0
In High Performance MySQL you will
learn about MySQL indexing and optimization in depth so you
can make better use of these key features. You will learn
practical replication, backup, and load-balancing strategies
with information that goes beyond available tools to discuss
their effects in real-life environments. And youll learn
the supporting techniques you need to carry out these tasks,
including advanced configuration, benchmarking, and
investigating logs.