Security is a primary task in all aspects of development and IT administration. This resource explains how much more is possible in the task of protecting corporate information resources by properly designing, managing, and maintaining security at the database level.
Reihe
Auflage
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Maße
Höhe: 23.6 cm
Breite: 19 cm
Gewicht
ISBN-13
978-0-471-21970-5 (9780471219705)
Schweitzer Klassifikation
MIKE YOUNG is Vice President of SofTouch, Inc., a Microsoft CTEC (Certified Training Education Center). He has been instructing trainers, corporations, and individuals on Microsoft Back Office products and Oracle databases for more than six years.
CURTIS W. YOUNG is President of SofTouch. A former CPA, Curtis has been designing courseware and training developers in Visual Studio and BackOffice for a decade.
About Gearhead Press
Responding to the ongoing needs of IT professionals for current and reliable information on the latest technologies, Wiley Technology Publishing introduces the Gearhead Press titles. These books, written by accomplished trainers in their respective fields, focus on real-world examples and case studies to give readers the best information on leading topics. The Gearhead Press titles are characterized by two imprints: In the Trenches and Point to Point. Both imprints include fast-paced books written by fellow IT professionals who have been there and done that. In the Trenches books guide readers to proficiency, and serve as practical, hands-on references after the initial tasks are accomplished. The Point to Point titles invite readers to join an IT team at a model company and implement technologies in real-world environments-demonstrating actual problems and solutions.
Acknowledgments.Introduction.About the Authors.Chapter 1. Introducing SQL Server Security.Chapter 2. Designing a Successful Security Model.Chapter 3. Exploring Initial Security Parameters.Chapter 4. Establishing Login Security.Chapter 5. Managing Object Security.Chapter 6. Designing Application Security.Chapter 7. Inplementing Front-End Application Security.Chapter 8. Implementing Microsoft's Enterprise Development Strategy.Chapter 9. Introducing the SQL Server Agent Service.Chapter 10. Managing Distributed Data Security.Chapter 11. Managing Data Transformation Services.Chapter 1. Exploring Analysis Services Security.Chapter 13. Managing Current Connections.Chapter 14.Creating an Audit Policy.Chapter 15. Managing Internet Security.Appendix A: XML for SQL Server 2000.Appendix B. Third-Party SQL Server Security Management Tools.Appendix C: Answers to Review Questions.Index.