Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Securing SQL serverprotecting your d...
~
Cherry, Denny,
Securing SQL serverprotecting your database from attackers /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Securing SQL serverDenny Cherry.
Reminder of title:
protecting your database from attackers /
Author:
Cherry, Denny,
Published:
Rockland :Syngress,2015.
Description:
1 online resource (xxii, 440 p.) :ill.
Notes:
Previous edition: 2012.
Subject:
Database security.
Online resource:
https://www.sciencedirect.com/science/book/9780128012758
ISBN:
9780128013755 (electronic bk.)
Securing SQL serverprotecting your database from attackers /
Cherry, Denny,
Securing SQL server
protecting your database from attackers /[electronic resource] :Denny Cherry. - Third edition. - Rockland :Syngress,2015. - 1 online resource (xxii, 440 p.) :ill.
Previous edition: 2012.
Includes bibliographical references and index.
Identifying Security Requirements -- Securing the Network -- Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Analysis Services -- Reporting Services -- SQL Injection Attacks -- Database Backup Security -- Storage Area Network Security -- Auditing for Security -- Server Rights -- SQL Server Agent Security -- Secuiring Data.
AnnotationSQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry -a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more. Presents hands-on techniques for protecting your SQL Server database from intrusion and attackProvides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014. Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
ISBN: 9780128013755 (electronic bk.)
LCCN: 2014953492Subjects--Uniform Titles:
SQL server.
Subjects--Topical Terms:
214959
Database security.
Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.73.S67 / C478 2015eb
Dewey Class. No.: 005.8
Securing SQL serverprotecting your database from attackers /
LDR
:03229cmm a2200313 a 4500
001
582189
006
o d
007
cnu|unuuu||
008
210121s2015 maua ob 001 0 eng d
010
$a
2014953492
020
$a
9780128013755 (electronic bk.)
020
$a
0128013753 (electronic bk.)
020
$a
9780128012758 (pbk.)
020
$a
0128012757 (pbk.)
035
$a
(OCoLC)896901331
035
$a
EL2020109
040
$a
UKMGB
$b
eng
$c
UKMGB
$d
OCLCO
$d
OCLCF
$d
N
$d
CUS
$d
N
$d
YDXCP
$d
UMI
$d
DEBBG
$d
TEFOD
$d
DEBSZ
$d
C6I
$d
OCLCQ
$d
OCLCO
$d
OSU
$d
OCLCQ
$d
K6U
$d
OTZ
$d
LIV
$d
VT2
$d
D6H
$d
VVB
$d
U3W
$d
CEF
$d
TXM
$d
COO
$d
WYU
$d
AU@
$d
LQU
041
0
$a
eng
050
4
$a
QA76.73.S67
$b
C478 2015eb
082
0 4
$a
005.8
$2
23
100
1
$a
Cherry, Denny,
$e
author.
$3
817250
245
1 0
$a
Securing SQL server
$h
[electronic resource] :
$b
protecting your database from attackers /
$c
Denny Cherry.
250
$a
Third edition.
260
$a
Rockland :
$b
Syngress,
$c
2015.
300
$a
1 online resource (xxii, 440 p.) :
$b
ill.
500
$a
Previous edition: 2012.
504
$a
Includes bibliographical references and index.
505
0
$a
Identifying Security Requirements -- Securing the Network -- Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Analysis Services -- Reporting Services -- SQL Injection Attacks -- Database Backup Security -- Storage Area Network Security -- Auditing for Security -- Server Rights -- SQL Server Agent Security -- Secuiring Data.
520
8
$a
Annotation
$b
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry -a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more. Presents hands-on techniques for protecting your SQL Server database from intrusion and attackProvides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014. Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
588
0
$a
Print version record.
630
0 0
$a
SQL server.
$3
199469
650
0
$a
Database security.
$3
214959
655
4
$a
Electronic books.
$2
local.
$3
214472
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128012758
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000187032
電子館藏
1圖書
電子書
EB QA76.73.S67 C478 2015eb 2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://www.sciencedirect.com/science/book/9780128012758
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login