語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Snowflake Security = Securing Your Snowflake Data Cloud /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Snowflake Security/ by Ben Herzberg, Yoav Cohen.
其他題名:
Securing Your Snowflake Data Cloud /
作者:
Herzberg, Ben.
其他作者:
Cohen, Yoav.
面頁冊數:
XXVII, 192 p. 28 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Data and Information Security. -
電子資源:
https://doi.org/10.1007/978-1-4842-7389-0
ISBN:
9781484273890
Snowflake Security = Securing Your Snowflake Data Cloud /
Herzberg, Ben.
Snowflake Security
Securing Your Snowflake Data Cloud /[electronic resource] :by Ben Herzberg, Yoav Cohen. - 1st ed. 2022. - XXVII, 192 p. 28 illus.online resource.
Chapter 1. Introduction -- Chapter 2. Account Security -- Chapter 3. Authentication -- Chapter 4. Data Access Control -- Chapter 5. Logging and Monitoring -- Chapter 6. Epilogue.
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations. What You Will Learn Implement security best practices for Snowflake Set up user provisioning, MFA, OAuth, and SSO Set up a Snowflake security model Design roles architecture Use advanced access control such as row-based security and dynamic masking Audit and monitor your Snowflake Data Cloud.
ISBN: 9781484273890
Standard No.: 10.1007/978-1-4842-7389-0doiSubjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Snowflake Security = Securing Your Snowflake Data Cloud /
LDR
:02928nam a22004215i 4500
001
1089433
003
DE-He213
005
20220512142707.0
007
cr nn 008mamaa
008
221228s2022 xxu| s |||| 0|eng d
020
$a
9781484273890
$9
978-1-4842-7389-0
024
7
$a
10.1007/978-1-4842-7389-0
$2
doi
035
$a
978-1-4842-7389-0
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Herzberg, Ben.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1396686
245
1 0
$a
Snowflake Security
$h
[electronic resource] :
$b
Securing Your Snowflake Data Cloud /
$c
by Ben Herzberg, Yoav Cohen.
250
$a
1st ed. 2022.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
XXVII, 192 p. 28 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. Introduction -- Chapter 2. Account Security -- Chapter 3. Authentication -- Chapter 4. Data Access Control -- Chapter 5. Logging and Monitoring -- Chapter 6. Epilogue.
520
$a
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations. What You Will Learn Implement security best practices for Snowflake Set up user provisioning, MFA, OAuth, and SSO Set up a Snowflake security model Design roles architecture Use advanced access control such as row-based security and dynamic masking Audit and monitor your Snowflake Data Cloud.
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Data protection.
$3
557764
700
1
$a
Cohen, Yoav.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1396687
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484273883
776
0 8
$i
Printed edition:
$z
9781484273906
776
0 8
$i
Printed edition:
$z
9781484284896
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7389-0
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入