Cargando…

Securing SQL server : protecting your database from attackers /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cherry, Denny (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland : Syngress, [2015]
Edición:Third edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn896901331
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mn|||||||||
008 141105t20152015maua ob 001 0 eng d
010 |a  2014953492 
040 |a UKMGB  |b eng  |e rda  |e pn  |c UKMGB  |d OCLCO  |d OCLCF  |d N$T  |d CUS  |d N$T  |d YDXCP  |d UMI  |d DEBBG  |d TEFOD  |d DEBSZ  |d C6I  |d OCLCQ  |d OCLCO  |d OSU  |d OCLCQ  |d K6U  |d OTZ  |d LIV  |d VT2  |d D6H  |d VVB  |d U3W  |d CEF  |d TXM  |d COO  |d WYU  |d AU@  |d LQU  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB4D1377  |2 bnb 
016 7 |a 016947804  |2 Uk 
016 7 |a 016945764  |2 Uk 
016 7 |a 016947804 
016 7 |a 016945764 
019 |a 910165758  |a 1008941949  |a 1066420832  |a 1088977141  |a 1103276629  |a 1105178398  |a 1105563835  |a 1125067076  |a 1129335536  |a 1153023471  |a 1192330633 
020 |a 9780128013755  |q (electronic bk.) 
020 |a 0128013753  |q (electronic bk.) 
020 |z 9780128012758  |q (pbk.) 
020 |z 0128012757  |q (pbk.) 
029 1 |a CHBIS  |b 010547557 
029 1 |a CHVBK  |b 341788546 
029 1 |a DEBBG  |b BV042683526 
029 1 |a DEBSZ  |b 446587311 
029 1 |a GBVCP  |b 825923069 
029 1 |a NZ1  |b 16097481 
029 1 |a CHNEW  |b 001026539 
029 1 |a UKMGB  |b 016947804 
035 |a (OCoLC)896901331  |z (OCoLC)910165758  |z (OCoLC)1008941949  |z (OCoLC)1066420832  |z (OCoLC)1088977141  |z (OCoLC)1103276629  |z (OCoLC)1105178398  |z (OCoLC)1105563835  |z (OCoLC)1125067076  |z (OCoLC)1129335536  |z (OCoLC)1153023471  |z (OCoLC)1192330633 
037 |a CL0500000595  |b Safari Books Online 
037 |a 2AC2D46C-EAF5-40C0-872E-1804EC791874  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.73.S67  |b C478 2015eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Cherry, Denny,  |e author. 
245 1 0 |a Securing SQL server :  |b protecting your database from attackers /  |c Denny Cherry. 
250 |a Third edition. 
264 1 |a Rockland :  |b Syngress,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (xxii, 440 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
336 |a still image  |b sti  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Previous edition: 2012. 
520 8 |a Annotation  |b SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry -a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more. Presents hands-on techniques for protecting your SQL Server database from intrusion and attackProvides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014. Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs. 
504 |a Includes bibliographical references and index. 
505 0 |a Identifying Security Requirements -- Securing the Network -- Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Analysis Services -- Reporting Services -- SQL Injection Attacks -- Database Backup Security -- Storage Area Network Security -- Auditing for Security -- Server Rights -- SQL Server Agent Security -- Secuiring Data. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a SQL server. 
630 0 7 |a SQL server  |2 fast 
650 0 |a Database security. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Database security  |2 fast 
776 0 8 |i Print version:  |a Cherry, Denny.  |t Securing SQL server.  |b Third edition.  |d Waltham, MA : Elsevier/Syngress, [2015]  |z 0128012757  |w (DLC) 2014953492  |w (OCoLC)915152019 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128012758/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 986474 
938 |a YBP Library Services  |b YANK  |n 12405384 
994 |a 92  |b IZTAP