HOME > 상세정보

상세정보

SQL server security

SQL server security

자료유형
단행본
개인저자
Andrews, Chip. Litchfield, David. Grindlay, Bill.
서명 / 저자사항
SQL server security / Chip Andrews, David Litchfield, Bill Grindlay.
발행사항
Emeryville, Calif. :   McGraw-Hill/Osborne ,   2003.  
형태사항
xxiv, 322 p. : ill. ; 23 cm.
ISBN
0072225157 :
서지주기
Includes index
일반주제명
Computer security.
000 00805namuu2200253 a 4500
001 000045271791
005 20060621113748
008 040824s2003 caua 01 eng
020 ▼a 0072225157 : ▼c $49.99
035 ▼a (KERIS)BIB000009689115
040 ▼d 211035 ▼d 211035 ▼d 244002
056 ▼a 005.8 ▼2 4
082 0 4 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b A565s
100 1 ▼a Andrews, Chip.
245 1 0 ▼a SQL server security / ▼c Chip Andrews, David Litchfield, Bill Grindlay.
260 ▼a Emeryville, Calif. : ▼b McGraw-Hill/Osborne , ▼c 2003.
300 ▼a xxiv, 322 p. : ▼b ill. ; ▼c 23 cm.
504 ▼a Includes index
630 0 0 ▼a Microsoft SQL Server (Computer file)
650 0 ▼a Computer security.
700 1 ▼a Litchfield, David.
700 1 ▼a Grindlay, Bill.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 A565s 등록번호 151205740 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Protect your data from the most sophisticated hackers with hands-on examples and sure-fire measures in SQL Server Security

Understand the ways in which SQL Server can be hacked, and what you can do to prevent exploitation of your data. Install, administer, and program secure Microsoft SQL Server environments and applications. Assess your risk and threat levels when designing a secure system. Make sure your defensive strategies match the threat when considering encryption options. Extend your defenses to include security auditing and intrusion detection. Implementing the techniques in this indispensable security resource is as close as you can get to guaranteed prevention against hackers without turning off the power switch.

Covers the latest techniques:

  • Install and configure your SQL Server environment for maximum security
  • Build and maintain a robust and protected database server
  • Protect valuable customer information, human resources data, and more
  • Defend against application software vulnerabilities and configuration issues
  • Ensure that access to data is only granted when appropriate
  • Encrypt data into an unreadable form to preserve confidentiality
  • Understand the mistakes that contributed to the spread of the SQL Slammer worm
  • Rid your applications of SQL injection bugs
  • Permit client applications to access the server securely
  • Build and utilize an effective auditing and intrusion detection plan


정보제공 : Aladin

목차

1: SQL Server Security: The Basics

2: Under Siege: How SQL Server Is Hacked

3: SQL Server Installation Tips

4: The Network-Libraries and Secure Connectivity

5: Authentication and Authorization

6: SQL Server in the Enterprise

7: Auditing and Intrusion Detection

8: Data Encryption

9: SQL Injection: When Firewalls Offer No Protection

10: Secure Architectures

Appendix A: System and Extended Stored Procedure Reference

Appendix B: Additional Technologies that Impact SQL Server Security

Appendix C: Connection Strings

Appendix D: Security Checklists


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)