LEADER 03633nam 22005655 450 001 9910135954303321 005 20200704041311.0 024 7 $a10.1007/978-1-4842-2265-2 035 $a(CKB)3710000000912284 035 $a(DE-He213)978-1-4842-2265-2 035 $a(MiAaPQ)EBC4722671 035 $a(CaSebORM)9781484222652 035 $a(PPN)196326524 035 $a(OCoLC)963965291 035 $a(OCoLC)ocn963965291 035 $a(EXLCZ)993710000000912284 100 $a20161021d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring SQL Server $eDBAs Defending the Database /$fby Peter A. Carter 205 $a1st ed. 2016. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2016. 215 $a1 online resource (XIX, 164 p. 38 illus., 37 illus. in color.) 225 0 $aExpert's Voice 300 $aIncludes index. 311 08$a9781484222645 311 08$a1484222644 311 08$a9781484222652 311 08$a1484222652 327 $a1. Threat Analysis -- 2. SQL Server Security Model -- 3. SQL Server Audit -- 4. Data-Level Security -- 5. Encryption in SQL Server -- 6. Security Metadata -- 7. Implementing Service Accounts for Security -- 8. Protecting Credentials -- 9. Reducing the Attack Surface. 330 $aProtect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database, consisting of multiple layers of protection. Learn to perform threat analysis, and to encrypt sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data that is confidential and important to the business. Database professionals in today's world deal increasingly often with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your company?s data secure. Securing SQL Server demonstrates how administrators and developers can both play their part in the protection of a SQL Server environment. This book provides a comprehensive technical guide to the security model, and to encryption within SQL Server, including coverage of the latest security technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security. Most importantly, the book gives practical advice and engaging examples on how to defend your data -- and ultimately your job! -- against attack and compromise. Covers the latest security technologies, including Always Encrypted, Dynamic Data Masking, and Row Level Security Promotes security best-practice and strategies for defense-in-depth of business-critical database assets Gives advice on performing threat analysis and reducing the attack surface that your database presents to the outside world. 606 $aDatabase management 606 $aComputer security 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aDatabase management. 615 0$aComputer security. 615 14$aDatabase Management. 615 24$aSystems and Data Security. 676 $a005.74 700 $aCarter$b Peter A$4aut$4http://id.loc.gov/vocabulary/relators/aut$0921976 801 0$bUMI 801 1$bUMI 906 $aBOOK 912 $a9910135954303321 996 $aSecuring SQL Server$92182059 997 $aUNINA