Although most of the time security isn't the favorite field of a SQL programmer, it's important to have a basic knowledge of how it works.
In this chapter, you analyzed the basic security options available with SQL Server, Oracle, DB2, MySQL, and Access. You saw how to create, modify, and remove database user accounts and how to set the appropriate level of permissions to them. For more information on securing your database, you should consult an RDBMS-specific book or the appropriate documentation.