Cargando…

Securing SQL server : protecting your database from attackers /

There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server datab...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cherry, Denny
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress, 2011.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn706802870
003 OCoLC
005 20231117044555.0
006 m o d
007 cr cn|||||||||
008 110311s2011 mau ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d MERUC  |d EBLCP  |d OCLCQ  |d N$T  |d E7B  |d YDXCP  |d CDX  |d OCLCQ  |d B24X7  |d TEF  |d UMI  |d COO  |d DEBSZ  |d OCLCQ  |d TEFOD  |d OCLCF  |d TEFOD  |d OCLCQ  |d IDEBK  |d OCLCQ  |d LIV  |d OCLCQ  |d OCLCO  |d OCLCA  |d U3W  |d D6H  |d CEF  |d UAB  |d INT  |d OCLCQ  |d OCLCO  |d WYU  |d LEAUB  |d AU@  |d VT2  |d OCLCQ  |d OCLCO  |d UHL  |d OCLCQ  |d UKSSU  |d OCLCQ  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO  |d INARC 
019 |a 700703941  |a 704371363  |a 759840952  |a 793359814  |a 1065048115  |a 1103262145  |a 1129369710  |a 1153006570  |a 1154814906  |a 1192350553  |a 1240511847 
020 |a 9781597496254  |q (electronic bk.) 
020 |a 1597496251  |q (electronic bk.) 
020 |a 9781597496261  |q (electronic bk.) 
020 |a 159749626X  |q (electronic bk.) 
020 |a 9780128013755 
020 |a 0128013753 
020 |a 9781282968912 
020 |a 1282968912 
035 |a (OCoLC)706802870  |z (OCoLC)700703941  |z (OCoLC)704371363  |z (OCoLC)759840952  |z (OCoLC)793359814  |z (OCoLC)1065048115  |z (OCoLC)1103262145  |z (OCoLC)1129369710  |z (OCoLC)1153006570  |z (OCoLC)1154814906  |z (OCoLC)1192350553  |z (OCoLC)1240511847 
050 4 |a QA76.73.S67  |b C478 2011 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
100 1 |a Cherry, Denny. 
245 1 0 |a Securing SQL server :  |b protecting your database from attackers /  |c Denny Cherry. 
260 |a Burlington, MA :  |b Syngress,  |c 2011. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged. 
505 0 |a Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists. 
520 |a "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--  |c Provided by publisher 
504 |a Includes bibliographical references and index. 
505 8 |a Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists. 
588 0 |a Print version record. 
630 0 0 |a SQL server. 
650 0 |a Client/server computing. 
650 0 |a Database security. 
650 0 |a Computer security. 
650 6 |a Architecture client-serveur (Informatique)  |0 (CaQQLa)201-0251236 
650 6 |a Bases de donn�ees  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0220408 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
630 0 7 |a SQL server.  |2 blmlsh 
630 0 7 |a SQL server  |2 fast  |0 (OCoLC)fst01376937 
650 7 |a Client/server computing  |2 fast  |0 (OCoLC)fst00864205 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Database security  |2 fast  |0 (OCoLC)fst00888063 
776 0 8 |i Print version:  |a Cherry, Denny.  |t Securing SQL server.  |d Burlington, MA : Syngress, 2011  |z 9781597496254  |w (DLC) 2010049453  |w (OCoLC)666246342 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597496254  |z Texto completo