Securing SQL server: protecting your database from attackers
Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Place of publication not identified]
Syngress
2012
|
Ausgabe: | [2nd ed.]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597499477/?ar |
Zusammenfassung: | Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest and most complex SQL Server installations in the world. This edition includes new chapters on Analysis Services, Reporting Services, and Storage Area Network Security. Presents hands-on techniques for protecting your SQL Server database from intrusion and attack. Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali). Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource illustrations |
ISBN: | 9781597499477 1597499471 9781597499521 1597499528 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04764835X | ||
003 | DE-627-1 | ||
005 | 20240228115020.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9781597499477 |c electronic bk. |9 978-1-59749-947-7 | ||
020 | |a 1597499471 |c electronic bk. |9 1-59749-947-1 | ||
020 | |a 9781597499521 |9 978-1-59749-952-1 | ||
020 | |a 1597499528 |9 1-59749-952-8 | ||
035 | |a (DE-627-1)04764835X | ||
035 | |a (DE-599)KEP04764835X | ||
035 | |a (ORHE)9781597499477 | ||
035 | |a (DE-627-1)04764835X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Cherry, Denny |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Securing SQL server |b protecting your database from attackers |c Denny Cherry |
250 | |a [2nd ed.]. | ||
264 | 1 | |a [Place of publication not identified] |b Syngress |c 2012 | |
300 | |a 1 Online-Ressource |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest and most complex SQL Server installations in the world. This edition includes new chapters on Analysis Services, Reporting Services, and Storage Area Network Security. Presents hands-on techniques for protecting your SQL Server database from intrusion and attack. Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali). Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs. | ||
630 | 2 | 0 | |a SQL server |
650 | 0 | |a Database security | |
650 | 0 | |a Client/server computing | |
650 | 4 | |a SQL server | |
650 | 4 | |a SQL server | |
650 | 4 | |a Bases de données ; Sécurité ; Mesures | |
650 | 4 | |a Architecture client-serveur (Informatique) | |
650 | 4 | |a Client/server computing | |
650 | 4 | |a Database security | |
776 | 1 | |z 9781597499477 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597499477 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597499477/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04764835X |
---|---|
_version_ | 1829007776619167745 |
adam_text | |
any_adam_object | |
author | Cherry, Denny |
author_facet | Cherry, Denny |
author_role | aut |
author_sort | Cherry, Denny |
author_variant | d c dc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04764835X (DE-599)KEP04764835X (ORHE)9781597499477 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [2nd ed.]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02973cam a22005172c 4500</leader><controlfield tag="001">ZDB-30-ORH-04764835X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115020.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499477</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-947-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499471</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-947-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597499521</subfield><subfield code="9">978-1-59749-952-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597499528</subfield><subfield code="9">1-59749-952-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764835X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04764835X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597499477</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04764835X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cherry, Denny</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing SQL server</subfield><subfield code="b">protecting your database from attackers</subfield><subfield code="c">Denny Cherry</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[2nd ed.].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest and most complex SQL Server installations in the world. This edition includes new chapters on Analysis Services, Reporting Services, and Storage Area Network Security. Presents hands-on techniques for protecting your SQL Server database from intrusion and attack. Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali). Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Bases de données ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Architecture client-serveur (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597499477</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597499477</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597499477/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04764835X |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:41Z |
institution | BVB |
isbn | 9781597499477 1597499471 9781597499521 1597499528 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress |
record_format | marc |
spelling | Cherry, Denny VerfasserIn aut Securing SQL server protecting your database from attackers Denny Cherry [2nd ed.]. [Place of publication not identified] Syngress 2012 1 Online-Ressource illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest and most complex SQL Server installations in the world. This edition includes new chapters on Analysis Services, Reporting Services, and Storage Area Network Security. Presents hands-on techniques for protecting your SQL Server database from intrusion and attack. Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali). Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs. SQL server Database security Client/server computing Bases de données ; Sécurité ; Mesures Architecture client-serveur (Informatique) 9781597499477 Erscheint auch als Druck-Ausgabe 9781597499477 |
spellingShingle | Cherry, Denny Securing SQL server protecting your database from attackers SQL server Database security Client/server computing Bases de données ; Sécurité ; Mesures Architecture client-serveur (Informatique) |
title | Securing SQL server protecting your database from attackers |
title_auth | Securing SQL server protecting your database from attackers |
title_exact_search | Securing SQL server protecting your database from attackers |
title_full | Securing SQL server protecting your database from attackers Denny Cherry |
title_fullStr | Securing SQL server protecting your database from attackers Denny Cherry |
title_full_unstemmed | Securing SQL server protecting your database from attackers Denny Cherry |
title_short | Securing SQL server |
title_sort | securing sql server protecting your database from attackers |
title_sub | protecting your database from attackers |
topic | SQL server Database security Client/server computing Bases de données ; Sécurité ; Mesures Architecture client-serveur (Informatique) |
topic_facet | SQL server Database security Client/server computing Bases de données ; Sécurité ; Mesures Architecture client-serveur (Informatique) |
work_keys_str_mv | AT cherrydenny securingsqlserverprotectingyourdatabasefromattackers |