Securing SQL server protecting your database from attackers /

There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server datab...

Full description

Main Author: Cherry, Denny.
Other Authors: ScienceDirect (Online service)
Format: eBook
Language: English
Published: Burlington, MA : Syngress, 2011.
Physical Description: 1 online resource.
Subjects:
LEADER 05770cam a2200853Ka 4500
001 706802870
003 OCoLC
005 20180526095644.8
006 m o d
007 cr cn|||||||||
008 110311s2011 mau ob 001 0 eng d
019 |a 700703941  |a 704371363  |a 759840952  |a 793359814 
020 |a 9781597496254  |q (electronic bk.) 
020 |a 1597496251  |q (electronic bk.) 
020 |a 9781597496261  |q (electronic bk.) 
020 |a 159749626X  |q (electronic bk.) 
020 |a 9780128013755 
020 |a 0128013753 
035 |a (OCoLC)706802870  |z (OCoLC)700703941  |z (OCoLC)704371363  |z (OCoLC)759840952  |z (OCoLC)793359814 
037 |a CL0500000136  |b Safari Books Online 
037 |a B1E4DCCE-A808-4B46-9D5E-4361380E3F54  |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d MERUC  |d EBLCP  |d OCLCQ  |d N$T  |d E7B  |d YDXCP  |d CDX  |d OCLCQ  |d B24X7  |d TEF  |d UMI  |d COO  |d DEBSZ  |d OCLCQ  |d TEFOD  |d OCLCF  |d TEFOD  |d OCLCQ  |d IDEBK  |d OCLCQ  |d LIV  |d OCLCQ  |d OCLCO  |d OCLCA 
049 |a COM6 
050 4 |a QA76.73.S67  |b C478 2011 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
100 1 |a Cherry, Denny. 
245 1 0 |a Securing SQL server :  |b protecting your database from attackers /  |c Denny Cherry. 
264 1 |a Burlington, MA :  |b Syngress,  |c 2011. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
520 |a There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged. 
505 0 |a Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists. 
520 |a "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--  |c Provided by publisher. 
504 |a Includes bibliographical references and index. 
505 8 |a Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists. 
588 0 |a Print version record. 
590 |a Elsevier  |b ScienceDirect All Books. 
630 0 0 |a SQL server. 
630 0 7 |a SQL server.  |2 blmlsh. 
630 0 7 |a SQL server.  |2 fast. 
650 0 |a Client/server computing. 
650 0 |a Database security. 
650 0 |a Computer security. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh. 
650 7 |a Client/server computing.  |2 fast. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Database security.  |2 fast. 
655 4 |a Electronic books. 
710 2 |a ScienceDirect (Online service) 
776 0 8 |i Print version:  |a Cherry, Denny.  |t Securing SQL server.  |d Burlington, MA : Syngress, 2011  |z 9781597496254  |w (DLC) 2010049453  |w (OCoLC)666246342. 
907 |a .b49817139  |b multi  |c -  |d 160302  |e 230104 
998 |a cue  |a cu  |b 180626  |c m  |d z   |e -  |f eng  |g mau  |h 0  |i 2 
948 |a MARCIVE Comp, in 2023.01 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Q2, 2018 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug 5, 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2023.01 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.08 
995 0 0 |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.06 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.09 
995 |a Loaded with m2btab.netlib2 in 2016 
989 |d cueme  |e  - -   |f  - -   |g j   |h 0  |i 0  |j 188  |k 180626  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w Elsevier  |1 .i119627115  |u http://ezproxy.coloradomesa.edu/login?url=https://www.sciencedirect.com/science/book/9781597496254  |3 Elsevier  |z Click here for access