Cargando…

SQL Server Transparent Data Encryption Protecting Database Files at Rest /

Protect yourself against data theft through unauthorized access to the physical database files and their copies that may be found in backup sets and transaction logs. Thwart unauthorized access to those files by making use of SQL Server's Transparent Data Encryption (TDE) feature to provide at-...

Descripción completa

Detalles Bibliográficos
Autor principal: Blinn, Eric (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico Video
Idioma:Inglés
Publicado: Apress, 2020.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007a 4500
001 OR_on1152556046
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cnu||||||||
007 vz czazuu
008 200420s2020 xx 035 vleng
040 |a AU@  |b eng  |c AU@  |d NZCPL  |d OCLCF  |d OCLCO  |d OCLCQ  |d DST 
019 |a 1232117885  |a 1300695072  |a 1303312813 
020 |z 9781484259221 
024 8 |a 9781484259221 
029 0 |a AU@  |b 000067075679 
035 |a (OCoLC)1152556046  |z (OCoLC)1232117885  |z (OCoLC)1300695072  |z (OCoLC)1303312813 
049 |a UAMI 
100 1 |a Blinn, Eric,  |e author. 
245 1 0 |a SQL Server Transparent Data Encryption  |h [electronic resource] :  |b Protecting Database Files at Rest /  |c Blinn, Eric. 
250 |a 1st edition. 
264 1 |b Apress,  |c 2020. 
300 |a 1 online resource (1 video file, approximately 35 min.) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a video file 
520 |a Protect yourself against data theft through unauthorized access to the physical database files and their copies that may be found in backup sets and transaction logs. Thwart unauthorized access to those files by making use of SQL Server's Transparent Data Encryption (TDE) feature to provide at-rest encryption of an entire database such that only authorized instances of SQL Server can read the data, log, and backup files. This video explains how the TDE feature works and shows how to implement at-rest encryption using best practices. It also covers independent backup encryption for an additional layer of protection. The video begins with an introduction to TDE and the pros and cons of its implementation. It talks about the use case for applying this type of encryption. The video then walks you through implementing TDE on a new database or existing database. Next, it will cover how to manage the movement of these encrypted databases. Finally, you'll cover independent backup encryption. What You Will Learn Recognize use cases for Transparent Data Encryption Encrypt your entire database, including log and backup files Preserve encryption keys and restore from encrypted backups Manage encryption through dynamic management objects Encrypt database backups independently of TDE Move a TDE encrypted database, including log files Who This Video Is For Database administrators who need to encrypt a database at rest to meet IT audit requirements, or for reasons of data privacy and confidentiality. For system architects who want to understand their options for securing their organization's confidential data. 
538 |a Mode of access: World Wide Web. 
542 |f Copyright © Eric Blinn  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title screen (viewed April 20, 2020) 
533 |a Electronic reproduction.  |b Boston, MA :  |c Safari.  |n Available via World Wide Web.,  |d 2020. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
655 4 |a Electronic videos. 
710 2 |a Safari, an O'Reilly Media Company. 
776 |z 1-4842-5922-X 
856 4 0 |u https://learning.oreilly.com/videos/~/9781484259221/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP