Contents

Title and Copyright Information

Preface

1 Introducing Oracle Berkeley DB Security

2 Designing Secure Applications Using Berkeley DB

3 Designing Secure Highly Available (HA) Applications

4 Authenticating Berkeley DB SQLite User

5 Configuring Security for Distributed Applications with Berkeley DB