Securing SQL Server Securing SQL Server

Securing SQL Server

Protecting Your Database from Attackers

    • $49.99
    • $49.99

Descripción editorial

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.

- Named a 2011 Systems Administration Book by InfoSec Reviews



- Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product



- Learn expert techniques to protect your SQL database environment



- Discover how to identify what an intruder accessed or damaged

GÉNERO
Informática e Internet
PUBLICADO
2010
27 de diciembre
IDIOMA
EN
Inglés
EXTENSIÓN
272
Páginas
EDITORIAL
Syngress
VENDEDOR
Elsevier Ltd.
TAMAÑO
4
MB
The Best Damn Exchange, SQL and IIS Book Period The Best Damn Exchange, SQL and IIS Book Period
2011
Microsoft Forefront Security Administration Guide Microsoft Forefront Security Administration Guide
2009
Check Point™ Next Generation With Application Intelligence Security Administration Check Point™ Next Generation With Application Intelligence Security Administration
2004
Penetration Tester's Open Source Toolkit (Enhanced Edition) Penetration Tester's Open Source Toolkit (Enhanced Edition)
2006
RADIUS RADIUS
2002
The Basics of Digital Privacy The Basics of Digital Privacy
2013
Securing SQL Server Securing SQL Server
2015
Securing SQL Server Securing SQL Server
2012
Enterprise-Grade IT Security for Small and Medium Businesses Enterprise-Grade IT Security for Small and Medium Businesses
2022
Fundamentos da privacidade digital Fundamentos da privacidade digital
2015