Cargando…

Securing SQL Server: Protecting Your Database from Attackers

There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server datab...

Descripción completa

Detalles Bibliográficos
Autor principal: Cherry, Denny
Lenguaje:eng
Publicado: Elsevier 2011
Materias:
Acceso en línea:http://cds.cern.ch/record/1412568
_version_ 1780923900298788864
author Cherry, Denny
author_facet Cherry, Denny
author_sort Cherry, Denny
collection CERN
description There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protec
id cern-1412568
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2011
publisher Elsevier
record_format invenio
spelling cern-14125682021-04-22T00:44:52Zhttp://cds.cern.ch/record/1412568engCherry, DennySecuring SQL Server: Protecting Your Database from AttackersComputing and ComputersThere is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protecElsevieroai:cds.cern.ch:14125682011
spellingShingle Computing and Computers
Cherry, Denny
Securing SQL Server: Protecting Your Database from Attackers
title Securing SQL Server: Protecting Your Database from Attackers
title_full Securing SQL Server: Protecting Your Database from Attackers
title_fullStr Securing SQL Server: Protecting Your Database from Attackers
title_full_unstemmed Securing SQL Server: Protecting Your Database from Attackers
title_short Securing SQL Server: Protecting Your Database from Attackers
title_sort securing sql server: protecting your database from attackers
topic Computing and Computers
url http://cds.cern.ch/record/1412568
work_keys_str_mv AT cherrydenny securingsqlserverprotectingyourdatabasefromattackers