IT Bookworm Blog

Apr 23 2009   5:00AM GMT

Hardening a SQL Server implementation

BrentSheets Brent Sheets Profile: BrentSheets

Overview: “If you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based reference you’ve been searching for. Authored by a world-class expert on SQL Server in the enterprise, this book goes far beyond the basics, taking on the complex tasks that DBAs need to make the most of Microsoft’s flagship database platform. SQL Server MVP, Ross Mistry presents proven techniques for SQL Server 2008 installation, upgrades, backup/restore, data transfer, indexing, high availability, security, and much more. He draws on extensive testing in high-profile production environments to offer step-by-step solutions and powerful tips you won’t find anywhere else.”

This free chapter has been selected from Microsoft SQL Server 2008 Management and Administration by Sams Publishing. Enjoy the chapter and be sure to check out the related SQL Server resources listed below. Voice your feedback on this chapter or let us know of other books you’d like to see featured on the IT Bookworm Blog by leaving a comment. Thanks.

Signature
Community Manager

Microsoft SQL Server 2008 Written by
Title
Published by
Published on
ISBN-10
ISBN-13
Ross Mistry and Hilary Cotter
Microsoft SQL Server 2008 Management and Administration
Sams Publishing
January 2, 2009
067233044X
978-0672330445

Download the chapter DOWNLOAD THE CHAPTER
Chapter 8: Hardening a SQL Server implementation

RELATED PEER ADVICE
  → Visit our SQL Server community or Security community
  → Need answers? Ask your own SQL Server or Security question

RELATED RESOURCES
  → Visit the SQL Server with Mr. Denny blog
  → Visit the The Multifunctioning DBA blog
  → Visit the Security Bytes blog
  → Browse SQL Server security resources
  → Browse SQL Server 2008 resources
  → Browse Database Security Management resources
  → Visit the SearchSQLServer.com website
  → Visit the SearchSecurity.com website

RELATED CONTENT
  → IT Definitions: Data corruption and Data hiding (visit the Database Glossary or App Security Glossary for more)
  → FAQ: How to troubleshoot and grant SQL Server permissions
  → Guide: Test for a Trojan horse on your SQL Server
  → Article: Enforcing data integrity in a SQL Server database
  → Article: SQL injection attacks targeting Flash, JavaScript errors
  → Article: Imperva assigns security risk levels to databases
  → Article: Microsoft updates code analysis tool, SQL injection XSS library
  → Security School: Free online information security training courses
  → Quiz: Database Basics or Security Basics

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: