Microsoft SQL Server 2012 Security Cookbook
Each recipe comprises step-by-step instructions followed by an analysis of what was done in each task and other useful information. The book is designed so that you can read it chapter by chapter, or look at the list of recipes and refer to them in no particular order. Each example comes with its expected output to make your learning even easier thus enabling you to successfully secure your SQL Server 2012 database. This book is for SQL Server administrators, developers, and consultants who want to secure their SQL Server database with cutting edge techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, securing business intelligence, and more. Working knowledge of SQL Server is expected.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
Active Directory administrative algorithm allow ALTER ASP.NET certificate choose client column Common Criteria configuration contained database CREATE LOGIN credentials data source database Audit database roles database user dbo.Prospect decrypt default disable doit encryption endpoint error example EXEC sp_configure EXECUTE Extended Protection FirstName following code Fred function Howit Howto Howtodoit impersonation injection INSERT installed inthe itworks Kerberos MASTER KEY Microsoft module msdb node NTLM NULL Object Explorer ofthe option password PowerShell private key recipe relay attacks rightclick schema SELECT permission Server Audit server level server role service account Service Broker SQL injection SQL login SQL Server 2012 SQL Server Agent SQL Server service SSAS SSMS stored procedure symmetric encryption SYMMETRIC KEY sysadmin There's todoit tothe User Account Control userdefined Web Application Firewalls Windows account Windows authentication Windows Firewall Windows Server Windows Server 2008