Listing 1 - 5 of 5 |
Sort by
|
Choose an application
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition , you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry - a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more. Presents hands-on techniques for protecting your SQL Server database from intrusion and attack Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2014. Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.
Client/server computing. --- Database security. --- Computer security. --- SQL server. --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data base security --- Databases --- Computer security --- Computing, Client/server --- Electronic data processing --- Protection --- Security measures --- Distributed processing --- Microsoft SQL server
Choose an application
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book written by Denny Cherry, a Microsoft SQL MVP and one of the biggest names in SQL server today, readers learn how to properly secure a SQL server database from internal and external threats using best practi
Database security. --- SQL server. --- Client/server computing. --- Computer security. --- Information Technology --- General and Others --- Data base security --- Databases --- Computer security --- Security measures --- Microsoft SQL server
Choose an application
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office.
Small business --- Business enterprises --- Computer networks --- Security measures. --- Businesses, Small --- Medium-sized business --- Micro-businesses --- Microbusinesses --- Microenterprises --- Small and medium-sized business --- Small and medium-sized enterprises --- Small businesses --- SMEs (Small business) --- Business --- Industries --- Size --- Data protection. --- Risk management. --- Computer security. --- Information technology --- Microsoft software. --- Microsoft .NET Framework. --- Data and Information Security. --- Mobile and Network Security. --- IT Risk Management. --- Principles and Models of Security. --- Business IT Infrastructure. --- Microsoft. --- Management. --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Insurance --- Management --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection --- Security measures
Choose an application
Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal inf
Computers --- Computer security. --- Computer networks --- Access control. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization’s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the “why” of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn: The importance of multi-factor authentication The limits of what multi-factor authentication can protect How firewalls are used to protect your company from attackers What zero-trust environments are and what they mean Whether zero-trust networks are what is needed to secure your own environment The security benefits from implementing a network segmentation policy The best ways to access files and resources from remote locations outside the office.
Production management --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- bedrijfssoftware --- bedrijfsautomatisering --- computerprogramma's --- netwerken (informatica) --- risk management --- programmeertalen --- computerbeveiliging --- mobiele communicatie --- Small business --- Business enterprises --- Computer networks --- Security measures.
Listing 1 - 5 of 5 |
Sort by
|