Securing SQL Server

Protecting Your Database from Attackers

Nonfiction, Computers, Database Management, Networking & Communications, Computer Security, General Computing
Cover of the book Securing SQL Server by Denny Cherry, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Denny Cherry ISBN: 9781597496261
Publisher: Elsevier Science Publication: December 27, 2010
Imprint: Syngress Language: English
Author: Denny Cherry
ISBN: 9781597496261
Publisher: Elsevier Science
Publication: December 27, 2010
Imprint: Syngress
Language: English

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.

  • Named a 2011 Systems Administration Book by InfoSec Reviews
  • Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product
  • Learn expert techniques to protect your SQL database environment
  • Discover how to identify what an intruder accessed or damaged
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.

More books from Elsevier Science

Cover of the book Hydrogen Supply Chain by Denny Cherry
Cover of the book Advances in Biorefineries by Denny Cherry
Cover of the book Combined Heat and Power by Denny Cherry
Cover of the book Valve Amplifiers by Denny Cherry
Cover of the book The Wireshark Field Guide by Denny Cherry
Cover of the book Nanomagnetism and Spintronics by Denny Cherry
Cover of the book Monitoring Water Quality by Denny Cherry
Cover of the book Brain and Behaviour by Denny Cherry
Cover of the book Information Literacy Landscapes by Denny Cherry
Cover of the book Cyber Attacks by Denny Cherry
Cover of the book Design of FRP and Steel Plated RC Structures by Denny Cherry
Cover of the book Stiehm's Immune Deficiencies by Denny Cherry
Cover of the book Bridges, Pathways and Transitions by Denny Cherry
Cover of the book Forensic Polymer Engineering by Denny Cherry
Cover of the book Theory of H[superscript p] spaces by Denny Cherry
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy