Protecting SQL Server Data


Protecting SQL Server Data
Protecting SQL Server Data
Open Access

Book Details

Author John Magnabosco
Publisher Red Gate
Published 2009
Edition 1st
Paperback 232 pages
Language English
ISBN-13 9781906434267
ISBN-10 1906434263
License Open Access

Book Description

In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture.

He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views and stored procedures, and then how to implement a secure data architecture using features such as cell-level encryption, transparent data encryption, one-way encryption, obfuscation, and more.

The battle to secure personal and business data is a tough one, and the consequences of mishandling sensitive data can be severe. Even more damaging than the fines and lawsuits that can be result from non-compliance with regulations, is the loss of customer confidence that results when these breaches of security occur.

Database Administrators must use every weapon and strategy at their disposal in the "war" to protect their sensitive data from would-be hackers, phishers, rumor mongers and identity thieves. Encryption is one of the primary weapons with which this battle can be won.


This book is published as open-access, which means it is freely available to read, download, and share without restrictions.

If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.

Download and Read Links

PDF

Share this Book

[localhost]# find . -name "*Similar_Books*"


Data Science with Microsoft SQL Server 2016

SQL R

R is one of the most popular, powerful data analytics languages and environments in use by data scientists. Actionable business data is often stored in Relational Database Management Systems (RDBMS), and one of the most widely used RDBMS is Microsoft SQL Server. Much more than a database server, it's a rich ecostructure with advanced analytic capab

SQL Server Hardware

SQL

SQL Server Hardware will provide the fundamental knowledge and resources you need to make intelligent decisions about choice, and optimal installation and configuration, of SQL Server hardware, operating system and the SQL Server RDBMS. Relational databases place heavy demands on their underlying hardware and many of these databases are mission-cri

Defensive Database Programming with SQL Server

SQL MS SQL

Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as develop

Introducing Microsoft SQL Server 2016

SQL

Build your database management knowledge with the technical open book, Introducing SQL Server 2016. Get an overview of the SQL Server 2016 features - from in-memory performance and enhanced security to end-to-end mobile business intelligence and advanced analytics. - Learn about faster queries, improved security, higher availability, and state-of-t

SQL Server Execution Plans, 3rd Edition

SQL

If a query is performing poorly, and you can't understand why, then that query's execution plan will tell you not only what data set is coming back, but also what SQL Server did, and in what order, to get that data. It will reveal how the data was retrieved, and from which tables and indexes, what types of joins were used, at what point filtering,

SQL Server Backup and Restore

SQL

In this book, you'll discover how to perform each of these backup and restore operations using SQL Server Management Studio (SSMS), basic T-SQL scripts and Redgate's SQL Backup tool. Capturing backups using SSMS or simple scripts is perfectly fine for one-off backup operations, but any backups that form part of the recovery strategy for any given d