LEADER 03206nam 2200517 450 001 9910827682603321 005 20231102105459.0 010 $a0-12-801375-3 035 $a(CKB)4100000009265256 035 $a(Safari)9780128012758 035 $a(OCoLC)910165758 035 $a(OCoLC)ocn910165758 035 $a(Au-PeEL)EBL2037826 035 $a(CaPaEBR)ebr11051871 035 $a(CaONFJC)MIL938662 035 $a(OCoLC)909895245 035 $z(PPN)198680880 035 $a(CaSebORM)9780128012758 035 $a(MiAaPQ)EBC2037826 035 $a(PPN)195471156 035 $a(EXLCZ)994100000009265256 100 $a20150516h20152015 uy 0 101 0 $aeng 135 $aurunu||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring SQL server $eprotecting your database from attackers /$fDenny Cherry 205 $aThird edition. 210 1$aAmsterdam, Netherlands :$cSyngress,$d2015. 210 4$d©2015 215 $a1 online resource (xxii, 440 pages) $cillustrations 311 $a0-12-801275-7 320 $aIncludes bibliographical references at the end of each chapters and index. 330 $aSQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition , you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more. Presents hands-on techniques for protecting your SQL Server database from intrusion and attack Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014. Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs. 606 $aDatabase security 615 0$aDatabase security. 676 $a005.8 700 $aCherry$b Denny$0940285 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910827682603321 996 $aSecuring SQL server$94038626 997 $aUNINA