Describes and demonstrates how to resolve database security issues at the design, implementation, and production phases. Designed for professionals, workshop settings, and self-learners, the book demonstrates several databases so the reader can follow along in a hands-on approach.