Skip to main content

Security

  • Chapter
MySQL
  • 460 Accesses

Abstract

It is a fact of life, or at least of human social organization, that not all information is intended to be made available to all individuals. Thus with MySQL a database is generally set up in such a way that not everyone can see all of the data (let alone change or delete it). In order to protect data from prying eyes (or unauthorized tampering), MySQL provides a dual access system. The first level determines whether the user has the right to communicate with MySQL at all. The second level determines what actions (such as SELECT, INSERT, DROP) are permitted for which databases, tables, or columns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Apress

About this chapter

Cite this chapter

Kofler, M. (2001). Security. In: MySQL. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-0853-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-1-4302-0853-2_7

  • Publisher Name: Apress, Berkeley, CA

  • Print ISBN: 978-1-893115-57-6

  • Online ISBN: 978-1-4302-0853-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics