SQL Server Security - K.Brian Kelley

SQL Server Security

What DBAs and Programmers Need to Know

(Autor)

Buch | Softcover
255 Seiten
2003 | 2003 ed.
Apress (Verlag)
978-1-59059-094-2 (ISBN)
64,15 inkl. MwSt
  • Titel wird leider nicht erscheinen
  • Artikel merken
Designed as a comprehensive look at securing SQL Server 2000, this book walks the reader through the basics of security and how it applies to a SQL Server install. The focus of the book then shifts to the internal mechanisms to protect data and audit access, and external systems.
Designed as a comprehensive look at securing SQL Server 2000, this book walks the reader through the basics of security and how it applies to a SQL Server install. The focus of the book then shifts to the internal mechanisms SQL Server uses to protect data and audit access. Later, external security and vulnerabilities due to applications and the operating system are examined. Network vulnerabilities with respect to the transmission of login information as well as unsecured data streams are also discussed. In addition, several third-party tools that can assist in auditing, securing, and reporting on SQL Server are reviewed.

K. Brian Kelley is currently an Enterprise Systems Architect with AgFirst Farm Credit Bank in Columbia, SC. Prior to that he served as a senior DBA and Web developer with AgFirst. His primary responsibilities include overhauling the current Windows NT infrastructure to provide for a highly available, network-optimized framework that is Active Directory ready. Brian assumed his Architect role in December 2001. He has been at AgFirst since January of 2000 when he originally came on-board as an Intranet web developer and database programmer. Prior to AgFirst, Brian worked as a system administrator and web developer for BellSouth's Yellow Pages group and served on active duty as an officer with the US Air Force. He has been a columnist at SQL Server Central since July 2001.

Part 1: Introduction: The Need for SQL Server Security; Formulating a Security Policy.- Part 2: Inside (Authorization): Fixer Server Roles; Leveraging Stored Procedures; Additional Security Measures; Locking Down System Tables.- Part 3: Outside (Authentication/Network): Understanding Authentication; Secure and Insecure Protocols; Leveraging Windows; Protecting Backups; Securing Applications; Auditing Your Environment; Security Tools; Changes Due to "Yukon".

Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Software Entwicklung
Informatik Theorie / Studium Kryptologie
ISBN-10 1-59059-094-5 / 1590590945
ISBN-13 978-1-59059-094-2 / 9781590590942
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00