|
![]() |
|||
|
||||
OverviewPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Protect your data from the most sophisticated hackers with hands-on examples and sure-fire measures in SQL Server Security Understand the ways in which SQL Server can be hacked, and what you can do to prevent exploitation of your data. Install, administer, and program secure Microsoft SQL Server environments and applications. Assess your risk and threat levels when designing a secure system. Make sure your defensive strategies match the threat when considering encryption options. Extend your defenses to include security auditing and intrusion detection. Implementing the techniques in this indispensable security resource is as close as you can get to guaranteed prevention against hackers without turning off the power switch. Covers the latest techniques: Install and configure your SQL Server environment for maximum security Build and maintain a robust and protected database server Protect valuable customer information, human resources data, and more Defend against application software vulnerabilities and configuration issues Ensure that access to data is only granted when appropriate Encrypt data into an unreadable form to preserve confidentiality Understand the mistakes that contributed to the spread of the SQL Slammer worm Rid your applications of SQL injection bugs Permit client applications to access the server securely Build and utilize an effective auditing and intrusion detection plan Full Product DetailsAuthor: David Litchfield , David Litchfield , Bill GrindlayPublisher: McGraw-Hill Education - Europe Imprint: Osborne/McGraw-Hill Dimensions: Width: 18.50cm , Height: 2.30cm , Length: 23.10cm Weight: 0.708kg ISBN: 9780072225150ISBN 10: 0072225157 Pages: 352 Publication Date: 16 September 2003 Audience: College/higher education , Professional and scholarly , Undergraduate , Postgraduate, Research & Scholarly Format: Paperback Publisher's Status: Unknown Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of Contents1: SQL Server Security: The Basics 2: Under Siege: How SQL Server Is Hacked 3: SQL Server Installation Tips 4: The Network-Libraries and Secure Connectivity 5: Authentication and Authorization 6: SQL Server in the Enterprise 7: Auditing and Intrusion Detection 8: Data Encryption 9: SQL Injection: When Firewalls Offer No Protection 10: Secure Architectures Appendix A: System and Extended Stored Procedure Reference Appendix B: Additional Technologies that Impact SQL Server Security Appendix C: Connection Strings Appendix D: Security ChecklistsReviewsAuthor InformationDavid Litchfield (Sutton, Surrey, England) is a world-renowned security expert specializing in Windows NT and Internet security. His discovery and remediation of over 100 major vulnerabilities in products such as Microsoft's Internet Information Server, SQL Server, and Oracle's Application Server have lead to the tightening of sites around the world. David Litchfield is also the author of Cerberus' Internet Scanner (previously NTInfoscan), one of the world's most popular free vulnerability scanners. In addition to CIS, David has written many other utilities to help identify and fix security holes. David is the author of many technical documents on security issues including his tutorial on Exploiting Windows NT Buffer Overruns referenced in the book ""Hacking Exposed"". David is a prominent speaker at security conferences worldwide and recently spoke on database security at the 2002 Black Hat Conference. Tab Content 6Author Website:Countries AvailableAll regions |