Securing SQL Server: DBAs defending the database
Providing practical advice and engaging examples, this book will help you protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, perform threat analysis, and encrypt sensitive data as a last line of defense against compromise. --
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[California]
Apress
[2018]
|
Ausgabe: | Second edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781484241615/?ar |
Zusammenfassung: | Providing practical advice and engaging examples, this book will help you protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, perform threat analysis, and encrypt sensitive data as a last line of defense against compromise. -- |
Beschreibung: | Includes bibliographical references. - Online resource; title from cover (Safari, viewed January 17, 2019) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047609621 | ||
003 | DE-627-1 | ||
005 | 20240228120632.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)047609621 | ||
035 | |a (DE-599)KEP047609621 | ||
035 | |a (ORHE)9781484241615 | ||
035 | |a (DE-627-1)047609621 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.2/768 |2 23 | |
100 | 1 | |a Carter, Peter A. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Securing SQL Server |b DBAs defending the database |c Peter A. Carter |
250 | |a Second edition. | ||
264 | 1 | |a [California] |b Apress |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Online resource; title from cover (Safari, viewed January 17, 2019) | ||
520 | |a Providing practical advice and engaging examples, this book will help you protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, perform threat analysis, and encrypt sensitive data as a last line of defense against compromise. -- | ||
630 | 2 | 0 | |a SQL server |
650 | 0 | |a Database security | |
650 | 4 | |a SQL server | |
650 | 4 | |a Bases de données ; Sécurité ; Mesures | |
650 | 4 | |a Database security | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484241615/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047609621 |
---|---|
_version_ | 1821494873174310912 |
adam_text | |
any_adam_object | |
author | Carter, Peter A. |
author_facet | Carter, Peter A. |
author_role | aut |
author_sort | Carter, Peter A. |
author_variant | p a c pa pac |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047609621 (DE-599)KEP047609621 (ORHE)9781484241615 |
dewey-full | 005.2/768 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.2/768 |
dewey-search | 005.2/768 |
dewey-sort | 15.2 3768 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01628cam a22004092 4500</leader><controlfield tag="001">ZDB-30-ORH-047609621</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120632.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047609621</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047609621</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484241615</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047609621</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.2/768</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carter, Peter A.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing SQL Server</subfield><subfield code="b">DBAs defending the database</subfield><subfield code="c">Peter A. Carter</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[California]</subfield><subfield code="b">Apress</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from cover (Safari, viewed January 17, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Providing practical advice and engaging examples, this book will help you protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, perform threat analysis, and encrypt sensitive data as a last line of defense against compromise. --</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484241615/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047609621 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:17Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Apress |
record_format | marc |
spelling | Carter, Peter A. VerfasserIn aut Securing SQL Server DBAs defending the database Peter A. Carter Second edition. [California] Apress [2018] ©2018 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Online resource; title from cover (Safari, viewed January 17, 2019) Providing practical advice and engaging examples, this book will help you protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, perform threat analysis, and encrypt sensitive data as a last line of defense against compromise. -- SQL server Database security Bases de données ; Sécurité ; Mesures |
spellingShingle | Carter, Peter A. Securing SQL Server DBAs defending the database SQL server Database security Bases de données ; Sécurité ; Mesures |
title | Securing SQL Server DBAs defending the database |
title_auth | Securing SQL Server DBAs defending the database |
title_exact_search | Securing SQL Server DBAs defending the database |
title_full | Securing SQL Server DBAs defending the database Peter A. Carter |
title_fullStr | Securing SQL Server DBAs defending the database Peter A. Carter |
title_full_unstemmed | Securing SQL Server DBAs defending the database Peter A. Carter |
title_short | Securing SQL Server |
title_sort | securing sql server dbas defending the database |
title_sub | DBAs defending the database |
topic | SQL server Database security Bases de données ; Sécurité ; Mesures |
topic_facet | SQL server Database security Bases de données ; Sécurité ; Mesures |
work_keys_str_mv | AT carterpetera securingsqlserverdbasdefendingthedatabase |