Book Description
Addresses SQL Server vulnerabilities and provides security solutions. Covers installation, administration, and programming--plus security issues such as authentication, encryption, intrusion detection, and more. Written for IT professionals administering or programming any SQL Server-based application--includes coverage of SQL Server 7, SQL Server 2000, and SQL Server (Yukon).
Download Description
Provides in-depth coverage of the installation, administration, and programming of secure Microsoft SQL Server environments and applications.
Book Info
Text shows how to protect data from the most sophisticated hackers, understand the ways in which SQL Server can be hacked, and what you can do to prevent exploitation of your data. Covers SQL Server 2000 and SQL Server 7. Softcover.
From the Back Cover
Protect your data from the most sophisticated hackers with hands-on examples and sure-fire measures in SQL Server Security. Understand the ways in which SQL Server can be hacked, and what you can do to prevent exploitation of your data. Install, administer, and program secure Microsoft SQL Server environments and applications. Assess your risk and threat levels when designing a secure system. Make sure your defensive strategies match the threat when considering encryption options. Extend your defenses to include security auditing and intrusion detection. Implementing the techniques in this indispensable security resource is as close as you can get to guaranteed prevention against hackers without turning off the power switch.
Covers the latest techniques: Install and configure your SQL Server environment for maximum security Build and maintain a robust and protected database server Protect valuable customer information, human resources data, and more Defend against application software vulnerabilities and configuration issues Ensure that access to data is only granted when appropriate Encrypt data into an unreadable form to preserve confidentiality Understand the mistakes that contributed to the spread of the SQL Slammer worm Rid your applications of SQL injection bugs Permit client applications to access the server securely Build and utilize an effective auditing and intrusion detection plan
About the Author
Chip Andrews, MCDBA, MCSE+I, is a Software Security Architect for Claris Corporation as well as an independent security consultant. Chip has more than 16 years of software development experience in the C++, Visual Basic, Java, C#, and T-SQL languages. He is a contributing author to several periodicals including Microsoft Certified Professional Magazine, SQL Server Magazine, and Dr. Dobbs Journal. Chip also has contributed a chapter on SQL Server Security to the book Hacking Exposed Windows 2000 by Osborne. He has given presentations at Black Hat computer security conferences concerning SQL Server security and its role in the secure enterprise.
SQL Server Security FROM THE PUBLISHER
Protect your data from the most sophisticated hackers with hands-on examples and sure-fire measures in SQL Server Security. Understand the ways in which SQL Server can be hacked, and what you can do to prevent exploitation of your data. Install, administer, and program secure Microsoft SQL Server environments and applications. Assess your risk and threat levels when designing a secure system. Make sure your defensive strategies match the threat when considering encryption options. Extend your defenses to include security auditing and intrusion detection. Implementing the techniques in this indispensable security resource is as close as you can get to guaranteed prevention against hackers without turning off the power switch.
SYNOPSIS
Protect your data from the most sophisticated hackers with hands-on examples and sure-fire measures in SQL Server Security. Understand the ways in which SQL Server can be hacked, and what you can do to prevent exploitation of your data. Install, administer, and program secure Microsoft SQL Server environments and applications. Assess your risk and threat levels when designing a secure system. Make sure your defensive strategies match the threat when considering encryption options. Extend your defenses to include security auditing and intrusion detection. Implementing the techniques in this indispensable security resource is as close as you can get to guaranteed prevention against hackers without turning off the power switch.
Covers the latest techniques: Install and configure your SQL Server environment for maximum security Build and maintain a robust and protected database server Protect valuable customer information, human resources data, and more Defend against application software vulnerabilities and configuration issues Ensure that access to data is only granted when appropriate Encrypt data into an unreadable form to preserve confidentiality Understand the mistakes that contributed to the spread of the SQL Slammer worm Rid your applications of SQL injection bugs Permit client applications to access the server securely Build and utilize an effective auditing and intrusion detection plan