Mastering SQL Server 2000 Security
Mike Young, Curtis W. Young
貴賓價: $1,045Java How to Program, 4/e
貴賓價: $2,195Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems (Paperback)
貴賓價: $1,670Understanding the Linux Kernel, 2/e (Paperback)
售價: $865Extreme Programming Installed (Paperback)
貴賓價: $3,424Interconnection Networks
貴賓價: $1,425LPIC 1 Certification Bible
售價: $640Performance Testing Microsoft .NET Web Applications
貴賓價: $1,701Managing Software Requirements: A Unified Approach
貴賓價: $1,946Professional ASP.NET Performance
貴賓價: $2,029Sonet/SDH, 3/e
貴賓價: $1,396Mastering Regular Expressions, 2/e
貴賓價: $2,545The Knowledge Management Toolkit, 2/e
貴賓價: $979RF Components and Circuits (Paperback)
貴賓價: $2,261Patterns of Enterprise Application Architecture (Hardcover)
貴賓價: $1,702Macromedia Flash MX Game Design Demystified
貴賓價: $1,078PCMCIA System Architecture, 2/e
貴賓價: $998Operating Systems: Internals and Design Principles, 4/e
貴賓價: $1,068Network Management: Principles and Practice
貴賓價: $1,995Design Patterns: Elements of Reusable Object-Oriented Software (Hardcover)
售價: $399The Unified Modeling Language User Guide
貴賓價: $1,663More Effective C++: 35 New Ways to Improve Your Programs and Designs (Paperback)
貴賓價: $1,330Applying UML and Patterns: An Introduction to Object-Oriented Analysis, 2/e(精裝)
貴賓價: $1,532802.11 Wireless Networks: The Definitive Guide
貴賓價: $1,396IPv6 Essentials (Paperback)
貴賓價: $1,378Lasers and Electro-optics : Fundamentals and Engineering
Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level
Security is a primary concern in all aspects of development and IT administration. While locking down networks and erecting firewalls will always be necessary, so much more can be done to protect a corporation's most valuable intangible assets: accounting records, customer lists, and inventories. Microsoft SQL Server 2000 has proven itself to be the fastest and most reliable product available for protecting corporate data. No other book covers as thoroughly the subject of security design and implementation strategies; Mastering SQL Server 2000 Security fills that gap in literature with practical, hands-on advice.
Packed with indispensable design information that can make a tightly secured database faster and easier to use, this book is essential reading for both administrators and developers of databases. The authors explain just how much more is possible in the task of protecting corporate information by properly designing, managing, and maintaining security at the database level.
From this book you will:
* Learn the ins and outs of SQL Server 2000 Security design
* Understand the implementation differences between SQL Server Authentication and Windows Authentication
* Understand the security options in SQL Server 2000 for Internet applications
* Integrate the security of Windows 2000 (Kerberos) into your SQL Server deployment
* Master the security requirements for distributed data environments, such as DTS, replication, linked servers, and data warehousing
Table of Contents
About the Authors.
Chapter 1. Introducing SQL Server Security.
Chapter 2. Designing a Successful Security Model.
Chapter 3. Exploring Initial Security Parameters.
Chapter 4. Establishing Login Security.
Chapter 5. Managing Object Security.
Chapter 6. Designing Application Security.
Chapter 7. Inplementing Front-End Application Security.
Chapter 8. Implementing Microsoft's Enterprise Development Strategy.
Chapter 9. Introducing the SQL Server Agent Service.
Chapter 10. Managing Distributed Data Security.
Chapter 11. Managing Data Transformation Services.
Chapter 1. Exploring Analysis Services Security.
Chapter 13. Managing Current Connections.
Chapter 14.Creating an Audit Policy.
Chapter 15. Managing Internet Security.
Appendix A: XML for SQL Server 2000.
Appendix B. Third-Party SQL Server Security Management Tools.
Appendix C: Answers to Review Questions.