語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Securing SQL server = protecting you...
~
Cherry, Denny,
Securing SQL server = protecting your database from attackers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Securing SQL server/ Denny Cherry.
其他題名:
protecting your database from attackers /
作者:
Cherry, Denny,
出版者:
Rockland :Syngress, : 2015.,
面頁冊數:
1 online resource (xxii, 440 p.) :ill. :
附註:
Previous edition: 2012.
標題:
Database security. -
電子資源:
https://www.sciencedirect.com/science/book/9780128012758
ISBN:
9780128013755 (electronic bk.)
Securing SQL server = protecting your database from attackers /
Cherry, Denny,
Securing SQL server
protecting your database from attackers /[electronic resource] :Denny Cherry. - Third edition. - Rockland :Syngress,2015. - 1 online resource (xxii, 440 p.) :ill.
Previous edition: 2012.
Includes bibliographical references and index.
Identifying Security Requirements -- Securing the Network -- Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Analysis Services -- Reporting Services -- SQL Injection Attacks -- Database Backup Security -- Storage Area Network Security -- Auditing for Security -- Server Rights -- SQL Server Agent Security -- Secuiring Data.
AnnotationSQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry -a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more. Presents hands-on techniques for protecting your SQL Server database from intrusion and attackProvides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014. Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
ISBN: 9780128013755 (electronic bk.)
LCCN: 2014953492Subjects--Uniform Titles:
SQL server.
Subjects--Topical Terms:
557798
Database security.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.73.S67 / C478 2015eb
Dewey Class. No.: 005.8
Securing SQL server = protecting your database from attackers /
LDR
:03233cam a2200313 a 4500
001
1000290
006
o d
007
cnu|unuuu||
008
201225s2015 maua ob 001 0 eng d
010
$a
2014953492
020
$a
9780128013755 (electronic bk.)
020
$a
0128013753 (electronic bk.)
020
$a
9780128012758 (pbk.)
020
$a
0128012757 (pbk.)
035
$a
(OCoLC)896901331
035
$a
EL2020109
040
$a
UKMGB
$b
eng
$c
UKMGB
$d
OCLCO
$d
OCLCF
$d
N$T
$d
CUS
$d
N$T
$d
YDXCP
$d
UMI
$d
DEBBG
$d
TEFOD
$d
DEBSZ
$d
C6I
$d
OCLCQ
$d
OCLCO
$d
OSU
$d
OCLCQ
$d
K6U
$d
OTZ
$d
LIV
$d
VT2
$d
D6H
$d
VVB
$d
U3W
$d
CEF
$d
TXM
$d
COO
$d
WYU
$d
AU@
$d
LQU
041
0
$a
eng
050
4
$a
QA76.73.S67
$b
C478 2015eb
082
0 4
$a
005.8
$2
23
100
1
$a
Cherry, Denny,
$e
author.
$3
1176694
245
1 0
$a
Securing SQL server
$h
[electronic resource] :
$b
protecting your database from attackers /
$c
Denny Cherry.
250
$a
Third edition.
260
$a
Rockland :
$b
Syngress,
$c
2015.
300
$a
1 online resource (xxii, 440 p.) :
$b
ill.
500
$a
Previous edition: 2012.
504
$a
Includes bibliographical references and index.
505
0
$a
Identifying Security Requirements -- Securing the Network -- Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Analysis Services -- Reporting Services -- SQL Injection Attacks -- Database Backup Security -- Storage Area Network Security -- Auditing for Security -- Server Rights -- SQL Server Agent Security -- Secuiring Data.
520
8
$a
Annotation
$b
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry -a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more. Presents hands-on techniques for protecting your SQL Server database from intrusion and attackProvides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014. Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
588
0
$a
Print version record.
630
0 0
$a
SQL server.
$3
565415
650
0
$a
Database security.
$3
557798
655
4
$a
Electronic books.
$2
local
$3
554714
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128012758
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入