LEADER 01853nmm a2200445 u 4500
001 EB001944366
003 EBX01000000000000001107268
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9780128013755 
020 |a 0128013753 
050 4 |a QA76.73.S67 
100 1 |a Cherry, Denny 
245 0 0 |a Securing SQL server  |b protecting your database from attackers  |c Denny Cherry 
250 |a Third edition 
260 |a Rockland  |b Syngress  |c 2015 
300 |a xxii, 440 pages  |b illustrations 
505 0 |a Identifying Security Requirements -- Securing the Network -- Key Management -- Database Encryption -- SQL Password Security -- Securing the Instance -- Analysis Services -- Reporting Services -- SQL Injection Attacks -- Database Backup Security -- Storage Area Network Security -- Auditing for Security -- Server Rights -- SQL Server Agent Security -- Secuiring Data 
505 0 |a Includes bibliographical references and index 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Bases de données / Sécurité / Mesures 
653 |a Database security / fast 
653 |a SQL server / fast 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Database security / http://id.loc.gov/authorities/subjects/sh90005677 
653 |a SQL server / http://id.loc.gov/authorities/names/n90684343 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
500 |a Previous edition: 2012 
015 |a GBB4D1377 
776 |z 9780128012758 
776 |z 9780128013755 
776 |z 0128012757 
776 |z 0128013753 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128012758/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8 
520 |a Annotation