In 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of millions of registered accounts on its gaming network. A month later, hackers claimed in a press release to have stolen personal information of 1 million users by a single SQL injection a
Microsoft SQL Server 2012 Security Cookbook
β Scribed by Rudi Bruchez
- Publisher
- Packt Publishing
- Year
- 2012
- Tongue
- English
- Leaves
- 322
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Over 70 practical, focused recipes to bullet-proof your SQL Server database and protect it from hackers and security threats Practical, focused recipes for securing your SQL Server database Master the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial of service attacks, and SQL Injection, and more A learn by example recipe based approach that focuses on key concepts to provide the foundation to solve real world problems In Detail In 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of millions of registered accounts on its gaming network. A month later, hackers claimed in a press release to have stolen personal information of 1 million users by a single SQL injection attack. In these days of high-profile hacking, SQL Server 2012 database security has become of prime importance βMicrosoft SQL Server 2012 Security Cookbookβ will show you how to secure your database using cutting-edge methods and protect it from hackers and other security threats. You will learn the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, securing business intelligence, and more. We will start with securing SQL Server right from the point where you install it. You will learn to secure your server and network with recipes such as managing service SIDs, configuring a firewall for SQL Server access, and encrypting the session by SSL. We will then address internal security: creating logins to connect to SQL Server, and users to gain access to a database. We will also see how to grant privileges to securable objects on the server or inside the database.
π SIMILAR VOLUMES
Practical, focused recipes for securing your SQL Server database. Master the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, and more. A learn-by-example recipe-based approach
<p>80 recipes to help you tune SQL Server 2012 and achieve optimal performance</p> <p><b>Overview</b></p> <ul> <li>Learn about the performance tuning needs for SQL Server 2012 with this book and ebook</li> <li>Diagnose problems when they arise and employ tricks to prevent them</li> <li>Explore vario
Packt Publishing, 2012. β 460 p.<div class="bb-sep"></div>80 recipes to help you tune SQL Server 2012 and achieve optimal performance.<div class="bb-sep"></div><strong>Overview:</strong><br/>Learn about the performance tuning needs for SQL Server 2012 with this book and ebook.<br/>Diagnose problems
<p>Over 80 expert recipes to design, create, and deploy SSIS packages</p> <ul> <li>Full of illustrations, diagrams, and tips with clear step-by-step instructions and real time examples</li> <li>Master all transformations in SSIS and their usages with real-world scenarios</li> <li>Learn to make SSIS
<p>Over 80 expert recipes to design, create, and deploy SSIS packages</p> <ul> <li>Full of illustrations, diagrams, and tips with clear step-by-step instructions and real time examples</li> <li>Master all transformations in SSIS and their usages with real-world scenarios</li> <li>Learn to make SSIS