|
|
|
|
LEADER |
01853nmm a2200445 u 4500 |
001 |
EB001944366 |
003 |
EBX01000000000000001107268 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9780128013755
|
020 |
|
|
|a 0128013753
|
050 |
|
4 |
|a QA76.73.S67
|
100 |
1 |
|
|a Cherry, Denny
|
245 |
0 |
0 |
|a Securing SQL server
|b protecting your database from attackers
|c Denny Cherry
|
250 |
|
|
|a Third edition
|
260 |
|
|
|a Rockland
|b Syngress
|c 2015
|
300 |
|
|
|a xxii, 440 pages
|b illustrations
|
505 |
0 |
|
|a Identifying Security Requirements -- Securing the Network -- Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Analysis Services -- Reporting Services -- SQL Injection Attacks -- Database Backup Security -- Storage Area Network Security -- Auditing for Security -- Server Rights -- SQL Server Agent Security -- Secuiring Data
|
505 |
0 |
|
|a Includes bibliographical references and index
|
653 |
|
|
|a COMPUTERS / Internet / Security / bisacsh
|
653 |
|
|
|a Bases de données / Sécurité / Mesures
|
653 |
|
|
|a Database security / fast
|
653 |
|
|
|a SQL server / fast
|
653 |
|
|
|a COMPUTERS / Networking / Security / bisacsh
|
653 |
|
|
|a Database security / http://id.loc.gov/authorities/subjects/sh90005677
|
653 |
|
|
|a SQL server / http://id.loc.gov/authorities/names/n90684343
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Previous edition: 2012
|
015 |
|
|
|a GBB4D1377
|
776 |
|
|
|z 9780128012758
|
776 |
|
|
|z 9780128013755
|
776 |
|
|
|z 0128012757
|
776 |
|
|
|z 0128013753
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128012758/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a Annotation
|