Cargando…

Securing SQL server : protecting Your database from attackers /

SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cherry, Denny (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam, Netherlands : Syngress, 2015.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn909895245
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cn|||||||||
008 150516t20152015ne ob 001 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d COO  |d EBLCP  |d DEBSZ  |d OCLCF  |d OCLCQ  |d IDB  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCQ  |d OCLCO  |d WRM  |d OCLCQ  |d CUY  |d LOA  |d ZCU  |d G3B  |d CNCEN  |d S8J  |d ICG  |d K6U  |d COCUF  |d CNNOR  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d VLB  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 908515053  |a 961648485  |a 1117852212 
020 |a 9780128013755  |q (e-book) 
020 |a 0128013753  |q (e-book) 
020 |a 0128012757 
020 |a 9780128012758 
020 |z 9780128012758 
029 1 |a CHNEW  |b 000891395 
029 1 |a CHNEW  |b 001001159 
029 1 |a DEBBG  |b BV043620296 
029 1 |a DEBSZ  |b 433557788 
035 |a (OCoLC)909895245  |z (OCoLC)908515053  |z (OCoLC)961648485  |z (OCoLC)1117852212 
050 4 |a QA76.9.C55  |b .C447 2015eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Cherry, Denny,  |e author. 
245 1 0 |a Securing SQL server :  |b protecting Your database from attackers /  |c Denny Cherry. 
264 1 |a Amsterdam, Netherlands :  |b Syngress,  |c 2015. 
264 4 |c ©2015 
300 |a 1 online resource (463 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references at the end of each chapters and index. 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright Page; Dedication; Contents; Author Biography; Technical Editor Biography; Acknowledgments; Introduction; Chapter 1 -- Identifying Security Requirements; Information in this chapter:; What are security objectives?; Personally Identifiable Information; When should security objectives been identified?; How to identify security objectives?; Chapter 2 -- Securing the Network; Information in this chapter; Securing the network; Network Firewalls; Web Server on the Public Internet Network; Web Server on the Internal Side of the Network; Web Server in the Demilitarized Zone. 
505 8 |a Server FirewallsWindows Firewall Inbound Rules; Windows Firewall Outbound Rules; Special Requirements for Clustering; Direct Internet Access; Public IP addresses versus private IP addresses; vLANs; Accessing SQL server from home; Setting up Routing and Remote Access; Allowing Users to VPN in to the Network; Setting up Client VPN Connection; Physical security; Keep Your Hands Off My Box; Open Network Ports; Unlocked Workstations; Automatically Locking Computers; Social engineering; Finding the instances; Testing the network security; Antivirus installation on SQL servers; Summary; References. 
505 8 |a Chapter 3 -- Key ManagementInformation in this chapter; Service master key; Database master key; Encryption password management; Enterprise key management; High availability and disaster recovery for key management; Conclusions; Chapter 4 -- Database Encryption; Information in this chapter:; Database encryption; Hashing versus Encryption; Triple DES; RC Algorithms; Advanced Encryption Standard; Hashing; SHA2 and SQL Server; Encrypting Objects; Encrypting data within tables; Encrypting within Microsoft SQL Server; Encrypting Within the Application Tier. 
505 8 |a Moving From Plain Text to Encrypted Values in an Existing ApplicationEncrypting data at rest; TDE and Filestream; Log Shipping, Database Mirroring and AlwaysOn Availability Groups; Key Protection; Encrypting data on the wire; SQL Server Over SSL; SQL Server 7 and 2000; SQL Server 2005 and Up; Certificate Strength Differences; Managing SSL Certificates; Hiding the Instance; IP Sec; Encrypting data with MPIO drivers; PowerPath Encryption with RSA Requirements and Setup; Encrypting data via HBAs; Summary; References; Chapter 5 -- SQL Password Security; Information in this chapter:; Login types. 
505 8 |a SQL Authentication LoginWindows Authentication Login; Domain Accounts; Local Accounts; Certificate Authentication; Asymmetric Key Login; Credentials; SQL server password security; Extended Protection; Service Principal Names; Strong passwords; Password change policies; Renaming the SA account; Disabling the SA account; Users versus logins; Contained database users in SQL server 2012 and beyond; Schemas; SQL Server 2000 and Below; SQL Server 2005 and Above; Domain Groups and Default Schemas; Setting the Default Schema; Encrypting client connection strings; SQL Reporting Services. 
520 |a SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practic. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a SQL server. 
630 0 7 |a SQL server  |2 fast 
650 0 |a Database security. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 7 |a Database security  |2 fast 
758 |i has work:  |a Securing SQL server (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFMP3F48rbHhPHQ3p8tBj3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Cherry, Denny.  |t Securing SQL server : protecting Your database from attackers.  |d Amsterdam, Netherlands : Syngress, ©2015  |h xxii, 440 pages  |z 9780128012758 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=2037826  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL2037826 
938 |a ebrary  |b EBRY  |n ebr11051871 
994 |a 92  |b IZTAP