In this talk we’ll look at the different ways to compromise MySQL security in typical deployment scenarios through vulnerabilities in the underlying hardware, the operating system, applications, and the network. We will not be focusing just on security from hackers, but from internal sources as well who may be intending to steal data.Some of these methods include:
Originally from Ukraine, Danil has been working with different RDBMS since early years in the university. Received Master’s Degree in Applied Math at the Donetsk National University in Ukraine where he also worked part time as a database developer for an accounting system. Danil got the taste for MySQL while working as a DBA for Sonopia Corp, where he participated in database design and support for social mobile network application. Currently helping people all over the world to solve problems with their MySQL systems as Team Lead at Pythian (www.pythian.com), a leading global database and application infrastructure services company.
Comments on this page are now closed.
For information on exhibition and sponsorship opportunities at the conference, contact Yvonne Romaine at firstname.lastname@example.org
For media-related inquiries, contact Maureen Jennings at email@example.com
To stay abreast of conference news and to receive email notification when registration opens, please sign up for the O'Reilly MySQL Conference newsletter (login required).
View a complete list of O'Reilly MySQL Conference contacts.