3 options
How to cheat at securing SQL server 2005 / Mark Horninger, technical editor ; [contributors] Timothy Blum ... [et al.].
- Format:
- Book
- Language:
- English
- Subjects (All):
- Client/server computing.
- Database security.
- Computer security.
- Physical Description:
- 1 online resource (433 p.)
- Edition:
- 1st edition
- Place of Publication:
- Burlington, Mass. : Syngress, c2007.
- Language Note:
- English
- System Details:
- text file
- Summary:
- The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.* Provides the multi-tasked Sys Admin with the essential information needed to perform the daily tasks * Covers SQL Server 2005, which is a massive produ
- Contents:
- Front Cover; How to Cheat at Securing SQL Server 2005; Copyright Page; Contents; Chapter 1. Introduction to SQL Server Security; Introduction; Security: Why Worry About It?; Installing SQL Server; Building Security into Your Application; Managed Code; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Surface Area Reduction; Introduction; SQL Server Surface Area; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Roles; Introduction; Roles; Situational Examples; Summary; Solutions Fast Track; Frequently Asked Questions
- Chapter 4. Authentication and Granular AccessIntroduction; Understanding the SQL Server Authentication Modes; Endpoint Security; Configuring Kerberos Support for your SQL Server; Auditing Authentication Attempts; Understanding Granular Access; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 5. Schemas; Introduction; Understanding Schemas; Changes Due to the User-Schema Separation; Designing Schemas; Managing Schemas; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Password Policies; Introduction; Password Policies in SQL Server 2005
- SQL Server ScenariosSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. DDL Triggers; Introduction; DDL Triggers Explained; Implementing DDL Triggers; Managing DDL Triggers; Scenarios for Deploying DDL Triggers; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Data Encryption; Introduction; Data Encryption Explained; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Reporting Services, Analysis Services, and Integration Services; Introduction; General SQL Server Best Security Practices; Securing Reporting Services
- Securing Analysis ServicesSecuring Integration Services; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix A: Group Policies; Group Policies Overview; Software Installation and Maintenance; Summary; Solutions Fast Track; Frequently Asked Questions; Appendix B: Securing Active Directory; Introduction; Designing an Access Control Strategy for Directory Services; Designing the Appropriate Group Strategy for Accessing Resources; Summary; Solutions Fast Track; Frequently Asked Questions; Index
- Notes:
- Includes index.
- ISBN:
- 1-281-98533-3
- 9786611985332
- 0-08-055554-3
- OCLC:
- 476238994
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.