Securing SQL server: protecting your database from attackers
There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server datab...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Burlington, MA
Syngress
2011
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597496254/?ar |
Zusammenfassung: | There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged. "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"-- |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource |
ISBN: | 9781597496254 1597496251 9781597496261 159749626X 9780128013755 0128013753 9781282968912 1282968912 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047648120 | ||
003 | DE-627-1 | ||
005 | 20240228114722.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2011 xx |||||o 00| ||eng c | ||
020 | |a 9781597496254 |c electronic bk. |9 978-1-59749-625-4 | ||
020 | |a 1597496251 |c electronic bk. |9 1-59749-625-1 | ||
020 | |a 9781597496261 |c electronic bk. |9 978-1-59749-626-1 | ||
020 | |a 159749626X |c electronic bk. |9 1-59749-626-X | ||
020 | |a 9780128013755 |9 978-0-12-801375-5 | ||
020 | |a 0128013753 |9 0-12-801375-3 | ||
020 | |a 9781282968912 |9 978-1-282-96891-2 | ||
020 | |a 1282968912 |9 1-282-96891-2 | ||
035 | |a (DE-627-1)047648120 | ||
035 | |a (DE-599)KEP047648120 | ||
035 | |a (ORHE)9781597496254 | ||
035 | |a (DE-627-1)047648120 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Cherry, Denny |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Securing SQL server |b protecting your database from attackers |c Denny Cherry |
264 | 1 | |a Burlington, MA |b Syngress |c 2011 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged. | ||
520 | |a "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"-- | ||
630 | 2 | 0 | |a SQL server |
650 | 0 | |a Client/server computing | |
650 | 0 | |a Database security | |
650 | 0 | |a Computer security | |
650 | 4 | |a SQL server | |
650 | 4 | |a SQL server | |
650 | 4 | |a Architecture client-serveur (Informatique) | |
650 | 4 | |a Bases de données ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Client/server computing | |
650 | 4 | |a Computer security | |
650 | 4 | |a Database security | |
776 | 1 | |z 9781597496254 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597496254 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597496254/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047648120 |
---|---|
_version_ | 1829007776656916480 |
adam_text | |
any_adam_object | |
author | Cherry, Denny |
author_facet | Cherry, Denny |
author_role | aut |
author_sort | Cherry, Denny |
author_variant | d c dc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047648120 (DE-599)KEP047648120 (ORHE)9781597496254 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03765cam a22006732c 4500</leader><controlfield tag="001">ZDB-30-ORH-047648120</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114722.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496254</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-625-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496251</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-625-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496261</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-626-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749626X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-626-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128013755</subfield><subfield code="9">978-0-12-801375-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128013753</subfield><subfield code="9">0-12-801375-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282968912</subfield><subfield code="9">978-1-282-96891-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282968912</subfield><subfield code="9">1-282-96891-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047648120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597496254</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648120</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cherry, Denny</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing SQL server</subfield><subfield code="b">protecting your database from attackers</subfield><subfield code="c">Denny Cherry</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture client-serveur (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597496254</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597496254</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597496254/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047648120 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:41Z |
institution | BVB |
isbn | 9781597496254 1597496251 9781597496261 159749626X 9780128013755 0128013753 9781282968912 1282968912 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Cherry, Denny VerfasserIn aut Securing SQL server protecting your database from attackers Denny Cherry Burlington, MA Syngress 2011 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged. "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"-- SQL server Client/server computing Database security Computer security Architecture client-serveur (Informatique) Bases de données ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General 9781597496254 Erscheint auch als Druck-Ausgabe 9781597496254 |
spellingShingle | Cherry, Denny Securing SQL server protecting your database from attackers SQL server Client/server computing Database security Computer security Architecture client-serveur (Informatique) Bases de données ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
title | Securing SQL server protecting your database from attackers |
title_auth | Securing SQL server protecting your database from attackers |
title_exact_search | Securing SQL server protecting your database from attackers |
title_full | Securing SQL server protecting your database from attackers Denny Cherry |
title_fullStr | Securing SQL server protecting your database from attackers Denny Cherry |
title_full_unstemmed | Securing SQL server protecting your database from attackers Denny Cherry |
title_short | Securing SQL server |
title_sort | securing sql server protecting your database from attackers |
title_sub | protecting your database from attackers |
topic | SQL server Client/server computing Database security Computer security Architecture client-serveur (Informatique) Bases de données ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
topic_facet | SQL server Client/server computing Database security Computer security Architecture client-serveur (Informatique) Bases de données ; Sécurité ; Mesures Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
work_keys_str_mv | AT cherrydenny securingsqlserverprotectingyourdatabasefromattackers |