Record ID | marc_loc_updates/v39.i27.records.utf8:5755870:2429 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_updates/v39.i27.records.utf8:5755870:2429?format=raw |
LEADER: 02429cam a22003134a 4500
001 2010049453
003 DLC
005 20110629111304.0
008 101228s2011 maua b 001 0 eng
010 $a 2010049453
020 $a9781597496254 (pbk.)
020 $a1597496251 (pbk.)
035 $a(OCoLC)ocn666246342
040 $aDLC$cDLC$dYDX$dBTCTA$dYDXCP$dMLY$dITD$dCDX$dVP@$dDLC
042 $apcc
050 00 $aQA76.73.S67$bC478 2011
082 00 $a005.8$222
100 1 $aCherry, Denny.
245 10 $aSecuring SQL server :$bprotecting your database from attackers /$cDenny Cherry ; Thomas Larock, technical editor.
260 $aBurlington, MA :$bSyngress,$cc2011.
300 $axv, 250 p. :$bill. ;$c24 cm.
520 $a"There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--$cProvided by publisher.
504 $aIncludes bibliographical references and index.
500 $aMachine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists .
505 8 $aMachine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists .
630 00 $aSQL server.
650 0 $aClient/server computing.
650 0 $aDatabase security.
650 0 $aComputer security.