Securing SQL server: protecting your database from attackers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress
2011
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"-- Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9781597496254 1597496251 9781597496261 159749626X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314261 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597496254 |c electronic bk. |9 978-1-59749-625-4 | ||
020 | |a 1597496251 |c electronic bk. |9 1-59749-625-1 | ||
020 | |a 9781597496261 |9 978-1-59749-626-1 | ||
020 | |a 159749626X |9 1-59749-626-X | ||
035 | |a (ZDB-33-EBS)ocn706802870 | ||
035 | |a (OCoLC)706802870 | ||
035 | |a (DE-599)BVBBV042314261 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Cherry, Denny |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing SQL server |b protecting your database from attackers |c Denny Cherry |
264 | 1 | |a Burlington, MA |b Syngress |c 2011 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged | ||
500 | |a "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"-- | ||
500 | |a Includes bibliographical references and index | ||
630 | 0 | 4 | |a SQL server |
650 | 4 | |a SQL server | |
650 | 4 | |a Computer science | |
650 | 4 | |a Database security | |
650 | 4 | |a Client/server computing / Security measures | |
650 | 4 | |a Computer security | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a SQL server |2 blmlsh | |
650 | 7 | |a SQL server |2 fast | |
650 | 7 | |a Client/server computing |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Database security |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Client/server computing | |
650 | 4 | |a Database security | |
650 | 4 | |a Computer security | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496254 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751252 |
Datensatz im Suchindex
_version_ | 1804152907232182272 |
---|---|
any_adam_object | |
author | Cherry, Denny |
author_facet | Cherry, Denny |
author_role | aut |
author_sort | Cherry, Denny |
author_variant | d c dc |
building | Verbundindex |
bvnumber | BV042314261 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn706802870 (OCoLC)706802870 (DE-599)BVBBV042314261 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03470nmm a2200613zc 4500</leader><controlfield tag="001">BV042314261</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496254</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-625-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496251</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-625-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496261</subfield><subfield code="9">978-1-59749-626-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749626X</subfield><subfield code="9">1-59749-626-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn706802870</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)706802870</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314261</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cherry, Denny</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing SQL server</subfield><subfield code="b">protecting your database from attackers</subfield><subfield code="c">Denny Cherry</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SQL server</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SQL server</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SQL server</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Client/server computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Client/server computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496254</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751252</subfield></datafield></record></collection> |
id | DE-604.BV042314261 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9781597496254 1597496251 9781597496261 159749626X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751252 |
oclc_num | 706802870 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress |
record_format | marc |
spelling | Cherry, Denny Verfasser aut Securing SQL server protecting your database from attackers Denny Cherry Burlington, MA Syngress 2011 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment. Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"-- Includes bibliographical references and index SQL server Computer science Database security Client/server computing / Security measures Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh SQL server blmlsh SQL server fast Client/server computing fast Computer security fast Database security fast Informatik Client/server computing http://www.sciencedirect.com/science/book/9781597496254 Verlag Volltext |
spellingShingle | Cherry, Denny Securing SQL server protecting your database from attackers SQL server Computer science Database security Client/server computing / Security measures Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh SQL server blmlsh SQL server fast Client/server computing fast Computer security fast Database security fast Informatik Client/server computing |
title | Securing SQL server protecting your database from attackers |
title_auth | Securing SQL server protecting your database from attackers |
title_exact_search | Securing SQL server protecting your database from attackers |
title_full | Securing SQL server protecting your database from attackers Denny Cherry |
title_fullStr | Securing SQL server protecting your database from attackers Denny Cherry |
title_full_unstemmed | Securing SQL server protecting your database from attackers Denny Cherry |
title_short | Securing SQL server |
title_sort | securing sql server protecting your database from attackers |
title_sub | protecting your database from attackers |
topic | SQL server Computer science Database security Client/server computing / Security measures Computer security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh SQL server blmlsh SQL server fast Client/server computing fast Computer security fast Database security fast Informatik Client/server computing |
topic_facet | SQL server Computer science Database security Client/server computing / Security measures Computer security COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Client/server computing Informatik |
url | http://www.sciencedirect.com/science/book/9781597496254 |
work_keys_str_mv | AT cherrydenny securingsqlserverprotectingyourdatabasefromattackers |