<p>SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.</p> <p>In <b><i>Securing SQL Server, Third Edition</i></b>, you will learn about the potential attack vec
Securing SQL Server, Third Edition: Protecting Your Database from Attackers
โ Scribed by Denny Cherry
- Publisher
- Syngress
- Year
- 2015
- Tongue
- English
- Leaves
- 442
- Edition
- 3
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.
In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world.
Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.
- Presents hands-on techniques for protecting your SQL Server database from intrusion and attack
- Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014.
- Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
โฆ Table of Contents
Content:
Front Matter, Page iii
Copyright, Page iv
Dedication, Page v
Author Biography, Page xv
Technical Editor Biography, Page xvii
Acknowledgments, Page xix
Introduction, Pages xxi-xxii
Chapter 1 - Identifying Security Requirements, Pages 1-6
Chapter 2 - Securing the Network, Pages 7-46
Chapter 3 - Key Management, Pages 47-56
Chapter 4 - Database Encryption, Pages 57-103
Chapter 5 - SQL Password Security, Pages 105-151
Chapter 6 - Securing the Instance, Pages 153-212
Chapter 7 - Analysis Services, Pages 213-234
Chapter 8 - Reporting Services, Pages 235-264
Chapter 9 - SQL Injection Attacks, Pages 265-291
Chapter 10 - Database Backup Security, Pages 293-311
Chapter 11 - Storage Area Network Security, Pages 313-320
Chapter 12 - Auditing for Security, Pages 321-355
Chapter 13 - Server Rights, Pages 357-389
Chapter 14 - SQL Server Agent Security, Pages 391-398
Chapter 15 - Securing Data, Pages 399-418
Appendix A - External Audit Checklists, Pages 419-430
Subject Index, Pages 431-440
๐ SIMILAR VOLUMES
There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server datab
<span>Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server datab
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirem
<div><div>Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulator
<p>Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead t