Cargando…
Securing SQL Server: Protecting Your Database from Attackers
There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server datab...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2011
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1412568 |
_version_ | 1780923900298788864 |
---|---|
author | Cherry, Denny |
author_facet | Cherry, Denny |
author_sort | Cherry, Denny |
collection | CERN |
description | There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protec |
id | cern-1412568 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2011 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-14125682021-04-22T00:44:52Zhttp://cds.cern.ch/record/1412568engCherry, DennySecuring SQL Server: Protecting Your Database from AttackersComputing and ComputersThere is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protecElsevieroai:cds.cern.ch:14125682011 |
spellingShingle | Computing and Computers Cherry, Denny Securing SQL Server: Protecting Your Database from Attackers |
title | Securing SQL Server: Protecting Your Database from Attackers |
title_full | Securing SQL Server: Protecting Your Database from Attackers |
title_fullStr | Securing SQL Server: Protecting Your Database from Attackers |
title_full_unstemmed | Securing SQL Server: Protecting Your Database from Attackers |
title_short | Securing SQL Server: Protecting Your Database from Attackers |
title_sort | securing sql server: protecting your database from attackers |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1412568 |
work_keys_str_mv | AT cherrydenny securingsqlserverprotectingyourdatabasefromattackers |