Cargando…

Securing SQL Server DBAs Defending the Database /

Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database, consisting of multiple layers of protection. Learn to perform threat analysis, and to encrypt sensitive data as a last line of defense against compromise. The multi-layered appr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Carter, Peter A. (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berkeley, CA : Apress : Imprint: Apress, 2016.
Edición:1st ed. 2016.
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-1-4842-2265-2
003 DE-He213
005 20220124160031.0
007 cr nn 008mamaa
008 161021s2016 xxu| s |||| 0|eng d
020 |a 9781484222652  |9 978-1-4842-2265-2 
024 7 |a 10.1007/978-1-4842-2265-2  |2 doi 
050 4 |a QA76.9.D3 
072 7 |a UN  |2 bicssc 
072 7 |a COM021000  |2 bisacsh 
072 7 |a UN  |2 thema 
082 0 4 |a 005.74  |2 23 
100 1 |a Carter, Peter A.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Securing SQL Server  |h [electronic resource] :  |b DBAs Defending the Database /  |c by Peter A. Carter. 
250 |a 1st ed. 2016. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2016. 
300 |a XIX, 165 p. 38 illus., 37 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a 1. Threat Analysis -- 2. SQL Server Security Model -- 3. SQL Server Audit -- 4. Data-Level Security -- 5. Encryption in SQL Server -- 6. Security Metadata -- 7. Implementing Service Accounts for Security -- 8. Protecting Credentials -- 9. Reducing the Attack Surface. 
520 |a Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database, consisting of multiple layers of protection. Learn to perform threat analysis, and to encrypt sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data that is confidential and important to the business. Database professionals in today's world deal increasingly often with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your company's data secure. Securing SQL Server demonstrates how administrators and developers can both play their part in the protection of a SQL Server environment. This book provides a comprehensive technical guide to the security model, and to encryption within SQL Server, including coverage of the latest security technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security. Most importantly, the book gives practical advice and engaging examples on how to defend your data -- and ultimately your job! -- against attack and compromise. Covers the latest security technologies, including Always Encrypted, Dynamic Data Masking, and Row Level Security Promotes security best-practice and strategies for defense-in-depth of business-critical database assets Gives advice on performing threat analysis and reducing the attack surface that your database presents to the outside world. 
650 0 |a Database management. 
650 0 |a Data protection. 
650 1 4 |a Database Management. 
650 2 4 |a Data and Information Security. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781484222645 
776 0 8 |i Printed edition:  |z 9781484222669 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-1-4842-2265-2  |z Texto Completo 
912 |a ZDB-2-CWD 
912 |a ZDB-2-SXPC 
950 |a Professional and Applied Computing (SpringerNature-12059) 
950 |a Professional and Applied Computing (R0) (SpringerNature-43716)