ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance

دانلود کتاب Snowflake Access Control: تسلط بر ویژگی های حفظ حریم خصوصی داده ها و انطباق با مقررات

Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance

مشخصات کتاب

Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance

ویرایش: [1 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1484280377, 9781484280379 
ناشر: Apress 
سال نشر: 2022 
تعداد صفحات: 268 
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 4 Mb 

قیمت کتاب (تومان) : 29,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب Snowflake Access Control: تسلط بر ویژگی های حفظ حریم خصوصی داده ها و انطباق با مقررات نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب Snowflake Access Control: تسلط بر ویژگی های حفظ حریم خصوصی داده ها و انطباق با مقررات

سطح کاربر متوسط


توضیحاتی درمورد کتاب به خارجی

Intermediate user level



فهرست مطالب

Table of Contents
About the Author
About the Technical Reviewer
Acknowledgments
Introduction
Part I: Background
	Chapter 1: What Is Access Control?
		Access Control Paradigms
			Role-Based Access Control (RBAC)
			Data Democratization
			Principle of Least Privilege (PLP)
			Rule-Based Access Control
			Attribute-Based Access Control (ABAC)
			Principle of Separation of Duties
		Access Control Methods
			Groups or Roles
			Lookup Tables and Mappings
			Miscellaneous Rules
		Wrapping Up
	Chapter 2: Data Types Requiring Access Control
		Personally Identifiable Information
			General PII
			Multimedia
			Protected Health Information (PHI)
			Financial Information
			Social Security Numbers and National Identity Numbers
			Passwords
		Non-PII Personal Data
		Anonymized Data
			Tokenized Data
				Tokenizing with Mock Data
				Using a One-Way Hash
				Encrypting Data
			Aggregated Data
		Internal Non-sensitive Information
		Publicly Available Information
		Other Sensitive Data
			Free Text Fields
			Financial Reporting Data
		Key Takeaways
	Chapter 3: Data Privacy Laws and Regulatory Drivers
		Internet Privacy
		GDPR
			Definitions
			Who Is Affected?
			Special Category of Personal Data
			Data Processing Principles
				Data Minimization
				Storage Limitation
				Integrity and Confidentiality
			Handling Data with GDPR Compliance
		APPI
			Definitions
			Who Is Affected?
			Handling Data with APPI Compliance
		CCPA
			Definitions
			Who Is Affected?
			Handling Data with CCPA Compliance
		US State General Privacy Regulations
		SOX
			Definitions
			Who Is Affected?
			Handling Data with SOX Compliance
				SOX Scope
				Creating Financial Reports
				Restricting Access
		HIPAA
			Definitions
			Who Is Affected?
			Handling Data with HIPAA Compliance
		Future Regulations
		Generalizing Data Privacy Regulations
		Key Takeaways
		Sources
	Chapter 4: Permission Types
		Permission Type Concepts
		Privilege Scope Categories
			Global and Account
			Databases, Warehouses, and Other Account Objects
			Schemas
			Schema Objects
		Snowflake Permission Types
			General
			Global and Account
			Databases
			Schemas
			Tables and Views
			Warehouses
		Granting and Revoking Privileges
			Granting Privileges
			Revoking Privileges
			Privilege Constraints
		Permission Modifiers
			All
			Future Grants
			With Grant Option
		Working with Permissions
			Read
			Write
			Dataset Admin
			System Admin
			Account Admin
			Other Specialized Roles
		Key Takeaways
Part II: Creating Roles
	Chapter 5: Functional Roles: What a Person Does
		What Are Roles in Snowflake?
		How Many Users Should Be in Each Role?
		What Are Functional Roles?
			Using Functional Roles for Job Function
			Using Functional Roles for a Dataset
		Why Should I Use Functional Roles?
		How Do I Use Functional Roles?
		Who Owns a Functional Role?
		Key Takeaways
	Chapter 6: Team Roles: Who a Person Is
		What Are Team Roles?
		Why Use Team Roles?
		How Do I Use Team Roles?
		Who Owns Team Roles?
		When Should I Use Team Roles and When Should I Use Functional Roles?
		How Can I Use Team Roles and Functional Roles Together?
		Key Takeaways
	Chapter 7: Assuming a Primary Role
		What Is a Primary Role?
		Default Roles
		How Do I Assume a Primary Role?
			Using SQL
			Using the Snowflake User Interface
			Using Python Connector
			Other Services
		How Do Primary Roles Work?
		Key Takeaways
	Chapter 8: Secondary Roles
		What Are Secondary Roles?
		Why Should I Use Secondary Roles?
		How Do I Use Secondary Roles?
			Enabling Secondary Roles for Users
			Enabling Secondary Roles on Integrations
			Logging and Ownership
			Disabling Secondary Roles
		Key Takeaways
Part III: Granting Permissions to Roles
	Chapter 9: Role Inheritance
		What Is Role Inheritance?
		Why Should I Use Role Inheritance?
		How Do I Use Role Inheritance?
			Creating a Hierarchy
				Functional Role Hierarchy
				Team Role Hierarchy
				Functional and Team Role Hierarchy
				Privilege Hierarchy
				Role Inheritance and Specialty Roles
			End User Experience
			Naming Conventions
		Role Inheritance and Secondary Roles
		Logging with Role Inheritance
		Key Takeaways
	Chapter 10: Account- and Database-Level Privileges
		Account Level
			User and Role Management
			Creating Account-Level Objects
			Monitoring Activity
			Miscellaneous
		Database Level
		Key Takeaways
	Chapter 11: Schema-Level Privileges
		What Is Schema-Level Access?
		Why Use Schema-Level Access?
		Schema-Level Privileges
			Administrative Privileges
				Managed Access
			Monitoring Privileges
			Read Privileges
			Write Privileges
			Data Engineering Platform Privileges
		Bulk Grants on Schema Objects
			All
			Future Grants
		Mapping Roles to Schemas
			Team Roles
			Functional Roles
		Specialized Schemas
		Key Takeaways
	Chapter 12: Table- and View-Level Privileges
		What Is Table-Level Access Control?
		Why Use Table-Level Access Control?
		What Are the Different Types of Views?
			Standard Views
			Materialized Views
			Secure Views
		Table- and View-Level Privileges
			Read Privileges
			Write Privileges
			Admin Privileges
		How Do I Implement Table-Level Access Control?
		How Does Table Level Work with Schema Level?
		Key Takeaways
	Chapter 13: Row-Level Permissioning and Fine-Grained Access Control
		What Is Row-Level Permissioning?
		Why Use Row-Level Permissioning?
		How Do I Use Row-Level Permissioning?
		Row Access Policies vs. Secure Views
		Creating Row Access Policies
			Creating a Basic Row Access Policy
			Creating a Row Access Policy Using a Mapping Table
			Creating More Complex Row Access Policies
			Removing a Row Access Policy
			Altering Row Access Policies
			Creating a Python Script to Generate Row Access Policies
			Constraints
		Using Secure Views
			Creating a Basic Secure View
			Creating a Secure View Using a Mapping Table
			Creating More Complex Secure Views
			Creating a Python Script to Generate Secure Views
		Tips and Tricks
			User-Defined Functions
			Aggregate Statistics
			Row-Level Permissioning with Secondary Roles
		Key Takeaways
	Chapter 14: Column-Level Permissioning and Data Masking
		What Is Column-Level Permissioning?
		Why Use Column-Level Permissioning?
		How Do I Implement Column-Level Permissioning?
		Using Dynamic Masking Policies
			Creating a Basic Masking Policy
			Creating a Python Script to Generate Masking Policies
			Masking JSON Data
			Constraints
		Using Secure Views
			Creating a Basic Secure View
			Creating a Python Script to Generate Secure Views
		Using Tokenization
		Combining Column-Level and Row-Level Permissions
		Tips and Tricks
			Categorize Data Types
			Create UDFs
			Use Consistent Naming Conventions
		Key Takeaways
Part IV: Operationally Managing Access Control
	Chapter 15: Secure Data Sharing
		What Is Secure Data Sharing?
		Why Use Secure Data Shares?
		How Do I Use Secure Data Shares?
			Provider Account
				Create a Share
				Grant Object Privileges to Share
				Verify Share Privileges
				Optionally Create a Reader Account
				Share with External Account
			Consumer Account
				Create Database from Share
				Grant Privileges on Share
			Revoking Access and Dropping Shares
				Revoking Object Privileges from a Share
				Revoking Access to a Share
				Dropping a Share
		Constraints
			Secure Views
			Cross-Region and Cross-Cloud Storage Platform
			CURRENT_USER and CURRENT_ROLE Functions
		Granular Access Control with Shares
			Access Control by Account
			Consuming Account RBAC
		Key Takeaways
	Chapter 16: Separating Production from Development
		What Does It Mean to Separate Production from Development?
		Why Separate Production from Development?
		How Do I Separate Production from Development?
			Types of Users to Support
				Platform Developers
				Pipeline Developers Working with External Sources
				SQL Developers Transforming Data
				Visualization Developers
			Creating a Dev Environment
				Using Separate Schemas
				Using Separate Databases
				Using Separate Accounts
			Populating Dev Data
				Production Data in Separate Schemas
				Production Data in Separate Databases
				Production Data in a Separate Account
				Synthetic Data
			RBAC in Dev
				For All Setups
				Separate Schemas
				Separate Database
				Separate Account
			Connecting to Dev
		Key Takeaways
	Chapter 17: Upstream and Downstream Services
		Upstream Services
			What Are Upstream Services?
			How Do I Maintain RBAC with Upstream Services?
				Data Sources
				Compute and Orchestration
				Cloud Storage
		Downstream Services
			What Are Downstream Services?
			How Do I Maintain RBAC with Downstream Services?
		Services That Are Upstream and Downstream
		Key Takeaways
	Chapter 18: Managing Access Requests
		Role Creation and Population
		Role Discovery
		Requests for Existing Roles
			Role Owners
			With Grant Option
			Using a Ticketing System
			Building a Custom Tool
		Key Takeaways
Index




نظرات کاربران