Securing SQL Server, Second Edition: Protecting Your Database from Attackers Buy on Amazon

https://www.ebooknetworking.net/books_detail-1597499471.html

Securing SQL Server, Second Edition: Protecting Your Database from Attackers

PublisherSyngress
CategoryCOMPUTERS
49.95 USD
Buy New on Amazon 🇺🇸 Buy Used — $25.70

Usually ships in 24 hours

Book Details

Author(s)Denny Cherry
PublisherSyngress
ISBN / ASIN1597499471
ISBN-139781597499477
AvailabilityUsually ships in 24 hours
Sales Rank963,492
CategoryCOMPUTERS
MarketplaceUnited States  🇺🇸

Description

SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.

In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book written by Denny Cherry, a Microsoft SQL MVP and one of the biggest names in SQL server today, readers learn how to properly secure a SQL server database from internal and external threats using best practices as well as specific tricks the authors employ in their roles as database administrators for some of the largest SQL server deployments in the world.

"Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He's a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesn't work, he's speaking from experience. Active in the community, his passion is sharing. You'll enjoy this book."--Buck Woody, Senior Technology Specialist, Microsoft

    • Presents hands-on techniques for protecting your SQL Server database from intrusion and attack.
    • Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali).
    • Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.

    More Books in COMPUTERS

    More Books by Denny Cherry

    Donate to EbookNetworking
    How Software Works:...Prev
    Picture Yourself Bu...Next