000 01954cam a22002054a 4500
020 _a9781597496254 (pbk.)
020 _a1597496251 (pbk.)
050 0 0 _aQA76.73.S67
_bC478
100 1 _aCherry, Denny.
245 1 0 _aSecuring SQL server :
260 _aBurlington, MA :
_bSyngress,
_c2011.
300 _axv, 250 p. :
_bill. ;
500 _aMachine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists .
505 8 _aMachine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists .
520 _a"There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--
650 0 _aClient/server computing.
650 0 _aDatabase security.
650 0 _aComputer security.
942 _cBK
999 _c12448
_d12448