Securing SQL server : (Record no. 12448)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01954cam a22002054a 4500 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9781597496254 (pbk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 1597496251 (pbk.) |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER | |
| Classification number | QA76.73.S67 |
| Item number | C478 |
| 100 1# - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Cherry, Denny. |
| 245 10 - TITLE STATEMENT | |
| Title | Securing SQL server : |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | Burlington, MA : |
| Name of publisher | Syngress, |
| Year of publication | 2011. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | xv, 250 p. : |
| Other physical details | ill. ; |
| 500 ## - GENERAL NOTE | |
| General note | Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists . |
| 505 8# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists . |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"-- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Client/server computing. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Database security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer security. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Books |
| Withdrawn status | Lost status | Not for loan | Collection code | Home library | Current library | Shelving location | Date entered | Source of acquisition | Cost, normal purchase price | Full call number | Bar code | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Shelf #2 | Directorate of Library Services | Directorate of Library Services | Social Science Collection | 08/05/2021 | Book Aid International | 85100.00 | MEDQA76.73.S67.C478 | 000000102368 | Books | |||
| Directorate of Library Services | Directorate of Library Services | General Collection | 09/09/2021 | BOOK AID | 56700.00 | MED QA76.S67.C478 | 000000102721 | Books |
