Securing SQL server :protecting your database from attackers
Material type:
TextPublication details: London Elsevier 2011.Edition: 2nd edDescription: xv, 250 p. illISBN: - 9781597499477
- MED QA76 567.C478
| Item type | Current library | Call number | Status | Barcode | |
|---|---|---|---|---|---|
Books
|
Directorate of Library Services General Collection | MED QA76.567.C478 (Browse shelf(Opens below)) | Available | 000000102719 |
Browsing Directorate of Library Services shelves, Shelving location: General Collection Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| MED QA76.9U83H37 The UX Book: Process and guidelines for ensuring a quality user experience | MED QA76.76.D47.B78 Software development : | MED QA76.76P37,M34 Structured parallel programing : | MED QA76.567.C478 Securing SQL server :protecting your database from attackers | MED QA76.585.S62 Private cloud computing | MED QA76.642.K57 Programming massively parallel processors | MED QA76.S67.C478 Securing SQL server : |
Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists .
Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists .
"There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--
There are no comments on this title.
