Language:
English
繁體中文
Help
Login
Back
to Search results for
[ subject:"Data and Information Security." ]
Switch To:
Labeled
|
MARC Mode
|
ISBD
Snowflake Security = Securing Your Snowflake Data Cloud /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Snowflake Security/ by Ben Herzberg, Yoav Cohen.
Reminder of title:
Securing Your Snowflake Data Cloud /
Author:
Herzberg, Ben.
other author:
Cohen, Yoav.
Description:
XXVII, 192 p. 28 illus.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data and Information Security. -
Online resource:
https://doi.org/10.1007/978-1-4842-7389-0
ISBN:
9781484273890
Snowflake Security = Securing Your Snowflake Data Cloud /
Herzberg, Ben.
Snowflake Security
Securing Your Snowflake Data Cloud /[electronic resource] :by Ben Herzberg, Yoav Cohen. - 1st ed. 2022. - XXVII, 192 p. 28 illus.online resource.
Chapter 1. Introduction -- Chapter 2. Account Security -- Chapter 3. Authentication -- Chapter 4. Data Access Control -- Chapter 5. Logging and Monitoring -- Chapter 6. Epilogue.
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations. What You Will Learn Implement security best practices for Snowflake Set up user provisioning, MFA, OAuth, and SSO Set up a Snowflake security model Design roles architecture Use advanced access control such as row-based security and dynamic masking Audit and monitor your Snowflake Data Cloud.
ISBN: 9781484273890
Standard No.: 10.1007/978-1-4842-7389-0doiSubjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Snowflake Security = Securing Your Snowflake Data Cloud /
LDR
:02928nam a22004215i 4500
001
1089433
003
DE-He213
005
20220512142707.0
007
cr nn 008mamaa
008
221228s2022 xxu| s |||| 0|eng d
020
$a
9781484273890
$9
978-1-4842-7389-0
024
7
$a
10.1007/978-1-4842-7389-0
$2
doi
035
$a
978-1-4842-7389-0
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Herzberg, Ben.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1396686
245
1 0
$a
Snowflake Security
$h
[electronic resource] :
$b
Securing Your Snowflake Data Cloud /
$c
by Ben Herzberg, Yoav Cohen.
250
$a
1st ed. 2022.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
XXVII, 192 p. 28 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1. Introduction -- Chapter 2. Account Security -- Chapter 3. Authentication -- Chapter 4. Data Access Control -- Chapter 5. Logging and Monitoring -- Chapter 6. Epilogue.
520
$a
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations. What You Will Learn Implement security best practices for Snowflake Set up user provisioning, MFA, OAuth, and SSO Set up a Snowflake security model Design roles architecture Use advanced access control such as row-based security and dynamic masking Audit and monitor your Snowflake Data Cloud.
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Data protection.
$3
557764
700
1
$a
Cohen, Yoav.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1396687
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484273883
776
0 8
$i
Printed edition:
$z
9781484273906
776
0 8
$i
Printed edition:
$z
9781484284896
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7389-0
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login