Securing SQL Server

Protecting Your Database from Attackers

Nonfiction, Computers, Database Management, Networking & Communications, Computer Security, General Computing
Cover of the book Securing SQL Server by Denny Cherry, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Denny Cherry ISBN: 9781597496261
Publisher: Elsevier Science Publication: December 27, 2010
Imprint: Syngress Language: English
Author: Denny Cherry
ISBN: 9781597496261
Publisher: Elsevier Science
Publication: December 27, 2010
Imprint: Syngress
Language: English

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.

  • Named a 2011 Systems Administration Book by InfoSec Reviews
  • Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product
  • Learn expert techniques to protect your SQL database environment
  • Discover how to identify what an intruder accessed or damaged
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.

More books from Elsevier Science

Cover of the book Photo Atlas of Mineral Pseudomorphism by Denny Cherry
Cover of the book Databook of Adhesion Promoters by Denny Cherry
Cover of the book Surface Modification by Solid State Processing by Denny Cherry
Cover of the book G Protein Coupled Receptors by Denny Cherry
Cover of the book Handbook of Compound Semiconductors by Denny Cherry
Cover of the book Building Your Library Career with Web 2.0 by Denny Cherry
Cover of the book Insect Immunity by Denny Cherry
Cover of the book Optical Interconnects for Data Centers by Denny Cherry
Cover of the book Risk and Return for Regulated Industries by Denny Cherry
Cover of the book Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security by Denny Cherry
Cover of the book Aeroacoustics of Low Mach Number Flows by Denny Cherry
Cover of the book Comprehensive Handbook of Iodine by Denny Cherry
Cover of the book Health Care and Environmental Contamination by Denny Cherry
Cover of the book Organic Syntheses Based on Name Reactions by Denny Cherry
Cover of the book Hydropower by Denny Cherry
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy