𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Securing SQL Server


Publisher
Syngress
Year
2012
Tongue
English
Leaves
385
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


  • ''Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. HeΒ’s a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesnΒ’t work, heΒ’s speaking from experience. Active in the community, his passion is sharing. YouΒ’ll enjoy this book.''--Buck Woody, Senior Technology Specialist, Microsoft
    ''Securing SQL Server - Protecting Your Database from Attackers and SQL Injection Attacks and Defense are two new books out on SQL security. The first, Securing SQL Server - Protecting Your Database from Attackers, author Denny Cherry takes a high-level approach to the topic. The book explains how to secure and protect a SQL database from attack. The book details how to configure SQL against both internal and external-based attacks. This updated edition includes new chapters on analysis services, reporting services, and storage area network security. For anyone new to SQL security, Cherry does a great job of explaining what needs to be done in this valuable guide. In and SQL Injection Attacks and Defense, editor Justin Clarke enlists the help of a set of experts on how to deal with SQL injection attacks. Since SQL is so ubiquitous on corporate networks, with sites often running hundreds of SQL servers; SQL is prone to attacks. SQL injection is a technique often used to attack databases through a website and is often done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. SQL injection is a code injection technique that exploits security vulnerability in a website's software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. With that, the need to defend servers against such attacks is an imperative and SQL Injection Attacks and Defense should be required reading for anyone tasks with securing SQL servers.''--RSA Conference


✦ Table of Contents


Content:
Front Matter, Pages i-ii
Copyright, Page iv
Acknowledgements, Page v
Dedication, Page vii
Author Biography, Page ix
About the Technical Editor, Page xi
Introduction, Pages xxi-xxii
Chapter 1 - Securing the Network, Pages 1-24, Denny Cherry
Chapter 2 - Database Encryption, Pages 25-73, Denny Cherry
Chapter 3 - SQL Password Security, Pages 75-102, Denny Cherry
Chapter 4 - Securing the Instance, Pages 103-145, Denny Cherry
Chapter 5 - Additional Security for an Internet Facing SQL Server and Application, Pages 147-163, Denny Cherry
Chapter 6 - Analysis Services, Pages 165-190, Denny Cherry
Chapter 7 - Reporting Services, Pages 191-220, Denny Cherry
Chapter 8 - SQL Injection Attacks, Pages 221-247, Denny Cherry
Chapter 9 - Database Backup Security, Pages 249-266, Denny Cherry
Chapter 10 - Storage Area Network Security, Pages 267-274, Denny Cherry
Chapter 11 - Auditing for Security, Pages 275-310, Denny Cherry
Chapter 12 - Server Rights, Pages 311-341, Denny Cherry
Chapter 13 - Securing Data, Pages 343-354, Denny Cherry
Appendix A - External Audit Checklists, Pages 355-366, Denny Cherry
Index, Pages 367-381


πŸ“œ SIMILAR VOLUMES


Securing SQL Server
✍ Cherry, Denny πŸ“‚ Library πŸ“… 2015 πŸ› Elsevier Science & Technology Books;Syngress 🌐 English

SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to

SQL Server Security Distilled
✍ Morris Lewis (auth.) πŸ“‚ Library πŸ“… 2004 πŸ› Apress 🌐 English

<p><p>SQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern for all businesses. Securing SQL Server is one of the most important responsibilities of the SQL Server professional.</p><p><i>SQL Server Distilled, Second Edition</i> is a very

SQL Server security distilled
✍ Morris Lewis πŸ“‚ Library πŸ“… 2004 πŸ› Apress 🌐 English

This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can't do with that data, in versions 6.5, 7.0, and 2000.

SQL Server Security Distilled
✍ Morris Lewis πŸ“‚ Library πŸ“… 2004 πŸ› Apress; Distributed to the book trade in the Unite 🌐 English

<p>SQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern for all businesses. Securing SQL Server is one of the most important responsibilities of the SQL Server professional.</p> <P><p> SQL Server Distilled, Second Edition is a very

Mastering SQL Server 2000 Security
✍ Mike Young, Curtis W. Young πŸ“‚ Library πŸ“… 2002 πŸ› Wiley 🌐 English

Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a primary concern in all aspects of development and IT administration. While locking down networks and erecting firewalls will always be necessary, so much more

Microsoft SQL Server 2012 Security Cookb
✍ Rudi Bruchez πŸ“‚ Library πŸ“… 2012 πŸ› Packt Publishing 🌐 English

In 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of millions of registered accounts on its gaming network. A month later, hackers claimed in a press release to have stolen personal information of 1 million users by a single SQL injection a