語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Snowflake access control = mastering...
~
Larson, Jessica Megan.
FindBook
Google Book
Amazon
博客來
Snowflake access control = mastering the features for data privacy and regulatory compliance /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Snowflake access control/ by Jessica Megan Larson.
其他題名:
mastering the features for data privacy and regulatory compliance /
作者:
Larson, Jessica Megan.
出版者:
Berkeley, CA :Apress : : 2022.,
面頁冊數:
xxii, 246 p. :ill., digital ;24 cm.
內容註:
Part I. Background -- 1. What is Access Control? -- 2. Data Types Requiring Access Control -- 3. Data Privacy Laws and Regulatory Drivers -- 4. Permission types -- Part II. Creating Roles -- 5. Functional Roles - What A Person Does -- 6. Team Roles - Who A Person Is -- 7. Assuming A Primary Role -- 8. Secondary Roles -- Part III. Granting Permissions to Roles -- 9. Role Inheritance -- 10. Account and Database Level Privileges -- 11. Schema-Level Privileges -- 12. Table and View Level Privileges -- 13. Row-Level Permissioning and Fine-Grained Access Control -- 14. Column-Level Permissioning and Data Masking -- Part IV. Operationally Managing Access Control -- 15. Secure Data Sharing -- 16. Separating Production from Development -- 17. Upstream & Downstream Services -- 18. Managing Access Requests.
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-1-4842-8038-6
ISBN:
9781484280386
Snowflake access control = mastering the features for data privacy and regulatory compliance /
Larson, Jessica Megan.
Snowflake access control
mastering the features for data privacy and regulatory compliance /[electronic resource] :by Jessica Megan Larson. - Berkeley, CA :Apress :2022. - xxii, 246 p. :ill., digital ;24 cm.
Part I. Background -- 1. What is Access Control? -- 2. Data Types Requiring Access Control -- 3. Data Privacy Laws and Regulatory Drivers -- 4. Permission types -- Part II. Creating Roles -- 5. Functional Roles - What A Person Does -- 6. Team Roles - Who A Person Is -- 7. Assuming A Primary Role -- 8. Secondary Roles -- Part III. Granting Permissions to Roles -- 9. Role Inheritance -- 10. Account and Database Level Privileges -- 11. Schema-Level Privileges -- 12. Table and View Level Privileges -- 13. Row-Level Permissioning and Fine-Grained Access Control -- 14. Column-Level Permissioning and Data Masking -- Part IV. Operationally Managing Access Control -- 15. Secure Data Sharing -- 16. Separating Production from Development -- 17. Upstream & Downstream Services -- 18. Managing Access Requests.
Understand the different access control paradigms available in the Snowflake Data Cloud and learn how to implement access control in support of data privacy and compliance with regulations such as GDPR, APPI, CCPA, and SOX. The information in this book will help you and your organization adhere to privacy requirements that are important to consumers and becoming codified in the law. You will learn to protect your valuable data from those who should not see it while making it accessible to the analysts whom you trust to mine the data and create business value for your organization. Snowflake is increasingly the choice for companies looking to move to a data warehousing solution, and security is an increasing concern due to recent high-profile attacks. This book shows how to use Snowflake's wide range of features that support access control, making it easier to protect data access from the data origination point all the way to the presentation and visualization layer. Reading this book helps you embrace the benefits of securing data and provide valuable support for data analysis while also protecting the rights and privacy of the consumers and customers with whom you do business. What You Will Learn Identify data that is sensitive and should be restricted Implement access control in the Snowflake Data Cloud Choose the right access control paradigm for your organization Comply with CCPA, GDPR, SOX, APPI, and similar privacy regulations Take advantage of recognized best practices for role-based access control Prevent upstream and downstream services from subverting your access control Benefit from access control features unique to the Snowflake Data Cloud.
ISBN: 9781484280386
Standard No.: 10.1007/978-1-4842-8038-6doiSubjects--Uniform Titles:
Snowflake (Electronic resource)
Subjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25 / L37 2022
Dewey Class. No.: 005.8
Snowflake access control = mastering the features for data privacy and regulatory compliance /
LDR
:03533nmm a2200325 a 4500
001
2299405
003
DE-He213
005
20220302144144.0
006
m d
007
cr nn 008maaau
008
230324s2022 cau s 0 eng d
020
$a
9781484280386
$q
(electronic bk.)
020
$a
9781484280379
$q
(paper)
024
7
$a
10.1007/978-1-4842-8038-6
$2
doi
035
$a
978-1-4842-8038-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
L37 2022
072
7
$a
UN
$2
bicssc
072
7
$a
COM021000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
L334 2022
100
1
$a
Larson, Jessica Megan.
$3
3596837
245
1 0
$a
Snowflake access control
$h
[electronic resource] :
$b
mastering the features for data privacy and regulatory compliance /
$c
by Jessica Megan Larson.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2022.
300
$a
xxii, 246 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Part I. Background -- 1. What is Access Control? -- 2. Data Types Requiring Access Control -- 3. Data Privacy Laws and Regulatory Drivers -- 4. Permission types -- Part II. Creating Roles -- 5. Functional Roles - What A Person Does -- 6. Team Roles - Who A Person Is -- 7. Assuming A Primary Role -- 8. Secondary Roles -- Part III. Granting Permissions to Roles -- 9. Role Inheritance -- 10. Account and Database Level Privileges -- 11. Schema-Level Privileges -- 12. Table and View Level Privileges -- 13. Row-Level Permissioning and Fine-Grained Access Control -- 14. Column-Level Permissioning and Data Masking -- Part IV. Operationally Managing Access Control -- 15. Secure Data Sharing -- 16. Separating Production from Development -- 17. Upstream & Downstream Services -- 18. Managing Access Requests.
520
$a
Understand the different access control paradigms available in the Snowflake Data Cloud and learn how to implement access control in support of data privacy and compliance with regulations such as GDPR, APPI, CCPA, and SOX. The information in this book will help you and your organization adhere to privacy requirements that are important to consumers and becoming codified in the law. You will learn to protect your valuable data from those who should not see it while making it accessible to the analysts whom you trust to mine the data and create business value for your organization. Snowflake is increasingly the choice for companies looking to move to a data warehousing solution, and security is an increasing concern due to recent high-profile attacks. This book shows how to use Snowflake's wide range of features that support access control, making it easier to protect data access from the data origination point all the way to the presentation and visualization layer. Reading this book helps you embrace the benefits of securing data and provide valuable support for data analysis while also protecting the rights and privacy of the consumers and customers with whom you do business. What You Will Learn Identify data that is sensitive and should be restricted Implement access control in the Snowflake Data Cloud Choose the right access control paradigm for your organization Comply with CCPA, GDPR, SOX, APPI, and similar privacy regulations Take advantage of recognized best practices for role-based access control Prevent upstream and downstream services from subverting your access control Benefit from access control features unique to the Snowflake Data Cloud.
630
0 0
$a
Snowflake (Electronic resource)
$3
3591358
650
0
$a
Computer security.
$3
540555
650
0
$a
Data warehousing.
$3
606996
650
1 4
$a
Database Management.
$3
891010
650
2 4
$a
Data Analysis and Big Data.
$3
3538537
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
898250
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-8038-6
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9441297
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 L37 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入