Securing SQL server protecting your database from attackers

In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teac...

Full description

Saved in:
Bibliographic Details
Main Author: Cherry, Denny (Author)
Format: Book
Language:English
Published: Waltham, MA Elsevier Syngress [date of publication not identified]
Edition:3rd edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 96956
003 MY-KLNDU
005 20241220021835.0
008 221104 2015xxua i 001 0 eng d
020 |a 9780128012758 
039 9 |a 202211041137  |b VLOAD  |c 201604261244  |d faezah  |c 201604261243  |d faezah  |c 201604210901  |d adaviah  |y 201512092015  |z zubir 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.73.S67  |b C34 2015 
100 1 |a Cherry, Denny  |e author 
245 1 0 |a Securing SQL server  |b protecting your database from attackers  |c Denny Cherry 
250 |a 3rd edition 
264 1 |a Waltham, MA  |b Elsevier  |b Syngress  |c [date of publication not identified] 
264 4 |c © 2015 
300 |a xxii, 440 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
505 0 |a Identifying Security Requirements -- Securing the Network --Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Auditing for Security -- SQL Injection Attacks -- Securing Data -- SQL Server Agent Security -- Server Rights 
520 |a In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world 
592 |a IN/11542  |b 11/03/2016  |c RM 205.47  |h INNOWAWASAN 
650 0 |a Database security 
650 0 |a SQL server 
650 0 |a Client/server computing 
650 0 |a Computer security 
999 |a vtls000056126  |c 96956  |d 96956