
- 462 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry -a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world.Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.- Presents hands-on techniques for protecting your SQL Server database from intrusion and attack- Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014.- Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Identifying Security Requirements
Abstract
Keywords
What are Security Objectives?
Personally Identifiable Information
When Should Security Objectives been Identified?
How to Identify Security Objectives?
Table of contents
- Cover
- Title page
- Table of Contents
- Copyright
- Dedication
- Author Biography
- Technical Editor Biography
- Acknowledgments
- Introduction
- Chapter 1: Identifying Security Requirements
- Chapter 2: Securing the Network
- Chapter 3: Key Management
- Chapter 4: Database Encryption
- Chapter 5: SQL Password Security
- Chapter 6: Securing the Instance
- Chapter 7: Analysis Services
- Chapter 8: Reporting Services
- Chapter 9: SQL Injection Attacks
- Chapter 10: Database Backup Security
- Chapter 11: Storage Area Network Security
- Chapter 12: Auditing for Security
- Chapter 13: Server Rights
- Chapter 14: SQL Server Agent Security
- Chapter 15: Securing Data
- Appendix A: External Audit Checklists
- Subject Index