Check nearby libraries
Buy this book
"There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--
Check nearby libraries
Buy this book
Previews available in: English
Showing 5 featured editions. View all 5 editions?
Edition | Availability |
---|---|
1
Securing SQL Server: Protecting Your Database from Attackers
2015, Elsevier Science & Technology Books
in English
0128013753 9780128013755
|
zzzz
Libraries near you:
WorldCat
|
2
Securing SQL Server: Protecting Your Database from Attackers
2015, Elsevier Science & Technology Books
in English
0128012757 9780128012758
|
zzzz
Libraries near you:
WorldCat
|
3
Securing SQL Server: Protecting Your Database from Attackers
2012, Elsevier Science & Technology Books
in English
1597499528 9781597499521
|
zzzz
Libraries near you:
WorldCat
|
4
Securing SQL server: protecting your database from attackers
2011, Syngress
in English
1597496251 9781597496254
|
aaaa
Libraries near you:
WorldCat
|
5
Securing SQL Server: Protecting Your Database from Attackers
2010, Elsevier Science & Technology Books
in English
159749626X 9781597496261
|
zzzz
Libraries near you:
WorldCat
|
Book Details
Edition Notes
Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists .
Includes bibliographical references and index.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created July 29, 2011
- 9 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
July 29, 2023 | Edited by ImportBot | import existing book |
December 13, 2022 | Edited by MARC Bot | import existing book |
November 14, 2020 | Edited by MARC Bot | import existing book |
October 9, 2020 | Edited by ImportBot | import existing book |
July 29, 2011 | Created by LC Bot | Imported from Library of Congress MARC record |