Search Books
How Software Works: The Mag… Picture Yourself Building a…

Securing SQL Server, Second Edition: Protecting Your Database from Attackers

Author Denny Cherry
Publisher Syngress
Category COMPUTERS
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
49.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $25.70

✓ Usually ships in 24 hours

Share:
Book Details
Author(s)Denny Cherry
PublisherSyngress
ISBN / ASIN1597499471
ISBN-139781597499477
AvailabilityUsually ships in 24 hours
Sales Rank963,492
CategoryCOMPUTERS
MarketplaceUnited States 🇺🇸

Description

SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.

In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book written by Denny Cherry, a Microsoft SQL MVP and one of the biggest names in SQL server today, readers learn how to properly secure a SQL server database from internal and external threats using best practices as well as specific tricks the authors employ in their roles as database administrators for some of the largest SQL server deployments in the world.

"Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He's a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesn't work, he's speaking from experience. Active in the community, his passion is sharing. You'll enjoy this book."--Buck Woody, Senior Technology Specialist, Microsoft

    • Presents hands-on techniques for protecting your SQL Server database from intrusion and attack.
    • Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali).
    • Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
    Deploying IP and MPLS QoS for Multiservice Networks: T…
    View
    Satellite and Terrestrial Radio Positioning Techniques…
    View
    Letting Go of the Words: Writing Web Content that Work…
    View
    DSP for Embedded and Real-Time Systems
    View
    Hacking with Kali: Practical Penetration Testing Techn…
    View
    Handbook on Securing Cyber-Physical Critical Infrastru…
    View
    The Basics of IT Audit: Purposes, Processes, and Pract…
    View
    Python Forensics: A workbench for inventing and sharin…
    View
    Machine Learning: A Bayesian and Optimization Perspect…
    View