Securing SQL Server

Protecting Your Database from Attackers

Nonfiction, Computers, Database Management, Networking & Communications, Computer Security, General Computing
Cover of the book Securing SQL Server by Denny Cherry, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Denny Cherry ISBN: 9781597496261
Publisher: Elsevier Science Publication: December 27, 2010
Imprint: Syngress Language: English
Author: Denny Cherry
ISBN: 9781597496261
Publisher: Elsevier Science
Publication: December 27, 2010
Imprint: Syngress
Language: English

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.

  • Named a 2011 Systems Administration Book by InfoSec Reviews
  • Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product
  • Learn expert techniques to protect your SQL database environment
  • Discover how to identify what an intruder accessed or damaged
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits.

More books from Elsevier Science

Cover of the book Eleventh Hour CISSP® by Denny Cherry
Cover of the book Advances in Agronomy by Denny Cherry
Cover of the book Sustainable Construction Materials by Denny Cherry
Cover of the book The Foundations of Vacuum Coating Technology by Denny Cherry
Cover of the book Nanotechnology Environmental Health and Safety by Denny Cherry
Cover of the book Handbook of Advanced Ceramics by Denny Cherry
Cover of the book Hydrogen Peroxide and Cell Signaling, Part B by Denny Cherry
Cover of the book The Brain by Denny Cherry
Cover of the book Chemistry and Biology by Denny Cherry
Cover of the book Social Cognition and Metacognition in Schizophrenia by Denny Cherry
Cover of the book Health, Safety and Ergonomics by Denny Cherry
Cover of the book Food Hygiene and Toxicology in Ready-to-Eat Foods by Denny Cherry
Cover of the book Local Community in the Era of Social Media Technologies by Denny Cherry
Cover of the book Sulfuric Acid Manufacture by Denny Cherry
Cover of the book Adult Stem Cells by Denny Cherry
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy