Abstract
It is a fact of life, or at least of human social organization, that not all information is intended to be made available to all individuals. Thus with MySQL a database is generally set up in such a way that not everyone can see all of the data (let alone change or delete it). In order to protect data from prying eyes (or unauthorized tampering), MySQL provides a dual access system. The first level determines whether the user has the right to communicate with MySQL at all. The second level determines what actions (such as SELECT, INSERT, DROP) are permitted for which databases, tables, or columns.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2001 Apress
About this chapter
Cite this chapter
Kofler, M. (2001). Security. In: MySQL. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0853-2_7
Download citation
DOI: https://doi.org/10.1007/978-1-4302-0853-2_7
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-893115-57-6
Online ISBN: 978-1-4302-0853-2
eBook Packages: Springer Book Archive