|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn706802870 |
003 |
OCoLC |
005 |
20231117044555.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
110311s2011 mau ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d MERUC
|d EBLCP
|d OCLCQ
|d N$T
|d E7B
|d YDXCP
|d CDX
|d OCLCQ
|d B24X7
|d TEF
|d UMI
|d COO
|d DEBSZ
|d OCLCQ
|d TEFOD
|d OCLCF
|d TEFOD
|d OCLCQ
|d IDEBK
|d OCLCQ
|d LIV
|d OCLCQ
|d OCLCO
|d OCLCA
|d U3W
|d D6H
|d CEF
|d UAB
|d INT
|d OCLCQ
|d OCLCO
|d WYU
|d LEAUB
|d AU@
|d VT2
|d OCLCQ
|d OCLCO
|d UHL
|d OCLCQ
|d UKSSU
|d OCLCQ
|d UKAHL
|d OCLCO
|d OCLCQ
|d OCLCO
|d INARC
|
019 |
|
|
|a 700703941
|a 704371363
|a 759840952
|a 793359814
|a 1065048115
|a 1103262145
|a 1129369710
|a 1153006570
|a 1154814906
|a 1192350553
|a 1240511847
|
020 |
|
|
|a 9781597496254
|q (electronic bk.)
|
020 |
|
|
|a 1597496251
|q (electronic bk.)
|
020 |
|
|
|a 9781597496261
|q (electronic bk.)
|
020 |
|
|
|a 159749626X
|q (electronic bk.)
|
020 |
|
|
|a 9780128013755
|
020 |
|
|
|a 0128013753
|
020 |
|
|
|a 9781282968912
|
020 |
|
|
|a 1282968912
|
035 |
|
|
|a (OCoLC)706802870
|z (OCoLC)700703941
|z (OCoLC)704371363
|z (OCoLC)759840952
|z (OCoLC)793359814
|z (OCoLC)1065048115
|z (OCoLC)1103262145
|z (OCoLC)1129369710
|z (OCoLC)1153006570
|z (OCoLC)1154814906
|z (OCoLC)1192350553
|z (OCoLC)1240511847
|
050 |
|
4 |
|a QA76.73.S67
|b C478 2011
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
|
|a Cherry, Denny.
|
245 |
1 |
0 |
|a Securing SQL server :
|b protecting your database from attackers /
|c Denny Cherry.
|
260 |
|
|
|a Burlington, MA :
|b Syngress,
|c 2011.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged.
|
505 |
0 |
|
|a Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists.
|
520 |
|
|
|a "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--
|c Provided by publisher
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
8 |
|
|a Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists.
|
588 |
0 |
|
|a Print version record.
|
630 |
0 |
0 |
|a SQL server.
|
650 |
|
0 |
|a Client/server computing.
|
650 |
|
0 |
|a Database security.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Architecture client-serveur (Informatique)
|0 (CaQQLa)201-0251236
|
650 |
|
6 |
|a Bases de donn�ees
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0220408
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
630 |
0 |
7 |
|a SQL server.
|2 blmlsh
|
630 |
0 |
7 |
|a SQL server
|2 fast
|0 (OCoLC)fst01376937
|
650 |
|
7 |
|a Client/server computing
|2 fast
|0 (OCoLC)fst00864205
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Database security
|2 fast
|0 (OCoLC)fst00888063
|
776 |
0 |
8 |
|i Print version:
|a Cherry, Denny.
|t Securing SQL server.
|d Burlington, MA : Syngress, 2011
|z 9781597496254
|w (DLC) 2010049453
|w (OCoLC)666246342
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597496254
|z Texto completo
|