ebooks and download videos Search All  Title  Author 
Home / Nonfiction / Computers / Database Management

Securing SQL Server: Protecting Your Database from Attackers

| £41.62 | €46.81 | Ca$67.52 | Au$66.64
by Denny Cherry
What is this?DRM-EPUB by download  |  $49.95
What is this?DRM-PDF by download  |  $49.95
add to wish list
Securing SQL Server: Protecting Your Database from Attackers by Denny Cherry

SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.

In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world.

Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.

  • Presents hands-on techniques for protecting your SQL Server database from intrusion and attack
  • Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014.
  • Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
  • To view this DRM protected ebook on your desktop or laptop you will need to have Adobe Digital Editions installed. It is a free software. We also strongly recommend that you sign up for an AdobeID at the Adobe website. For more details please see FAQ 1&2. To view this ebook on an iPhone, iPad or Android mobile device you will need the Adobe Digital Editions app, or BlueFire Reader or Txtr app. These are free, too. For more details see this article.

    SHARE  Share by Email  Share on Facebook  Share on Twitter  Share on Linked In  Share on Delicious
    or call in the US toll free 1-888-866-9150 product ID: 704366

    Ebook Details
    Pages: 462
    Size: 65.2 MB
    Publisher: Syngress
    Date published:   2015
    ISBN: 2370006606116 (DRM-EPUB)
    9780128013755 (DRM-PDF)

    DRM Settings
    Read Aloud:  not allowed

This product is listed in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Database Management

This author has products in the following categories:

Nonfiction > Computers > Security
Nonfiction > Computers > Database Management
Nonfiction > Computers > Internet > Security

If you find anything wrong with this product listing, perhaps the description is wrong, the author is incorrect, or it is listed in the wrong category, then please contact us. We will promptly address your feedback.

Submit 5 page SummaryWhat is this?

© 2016