Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting SQL Server Data

Buy
Protecting SQL Server Data, 9781906434274 (1906434271), Red gate, 2009

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These valuable, often sensitive, data assets are stored in a SQL Server database, and entrusted to the Database Administrator, who must use every weapon and strategy at his or her disposal in the "war" to protect this sensitive data from would-be hackers, phishers, rumor mongers and identity thieves. Encryption is one of the primary weapons with which this battle can be won, and yet it is treated with trepidation by many, who fear that it will prove "just another way for data to be lost" or "an unjustifiable cost on performance".

This book holds the key to "encryption without fear". In it, the author goes way beyond the usual demonstration of the SQL Server cryptographic functions. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views and stored procedures, and then how to implement an efficient and secure data architecture using the available SQL encryption features, such as cell-level encryption, transparent data encryption and one-way encryption.

At each stage the author covers not only how the features work, but also described the situations when they are and are not suitable, and at all times stresses the steps that must be taken to ensure that the solution is maintainable.

Table of Contents

  •  
  • Chapter 01: Understanding Sensitive Data
  • Chapter 02: Data Classification and Roles
  • Chapter 03: Schema Architecture Strategies
  • Chapter 04: Encryption Basics for SQL Server
  • Chapter 05: Cell-level Encryption
  • Chapter 06: Transparent Data Encryption
  • Chapter 07: One-way Encryption
  • Chapter 08: Obfuscation
  • Chapter 09: HoneyCombing a Database
  • Chapter 10: Layering Solutions
  • Appendix A: Views and Functions Reference
  • Appendix B: The HomeLending Database
(HTML tags aren't allowed.)

Oracle Certified Professional Java SE 7 Programmer Exams 1Z0-804 and 1Z0-805: A Comprehensive OCPJP 7 Certification Guide (Expert's Voice in Java)
Oracle Certified Professional Java SE 7 Programmer Exams 1Z0-804 and 1Z0-805: A Comprehensive OCPJP 7 Certification Guide (Expert's Voice in Java)

Oracle Certified Professional Java SE 7 Programmer Exams 1Z0-804 and 1Z0-805 is a concise, comprehensive, step-by-step, and one-stop guide for the Oracle Certified Professional Java SE 7 Programmer Exam. The first two chapters set the stage for exam preparation and let the reader get started quickly. The first chapter answers...

Pro Windows Small Business Server 2003
Pro Windows Small Business Server 2003
Microsofts Windows Small Business Server has taken the market by storm, offering a compelling solution for business with 50 or fewer employees. Pro Windows Small Business Server 2003 is a complete guide for you intermediate-to-advanced administrators who have deployed SBS, gotten it working for your organizations, and want to take the...
Paediatric Advanced Life Support: A Practical Guide for Nurses
Paediatric Advanced Life Support: A Practical Guide for Nurses

In the event of a paediatric cardiac arrest, it is essential to be able to respond rapidly, providing safe and effective care. The second edition of this successful text provides nurses with a practical and systematic guide to the rapid assessment and delivery of appropriate resuscitation to infants and children.


Multilingual Speech Processing
Multilingual Speech Processing
Tanja Schultz and Katrin Kirchhoff have compiled a comprehensive overview of speech processing from a multilingual perspective. By taking this all-inclusive approach to speech processing, the editors have included theories, algorithms, and techniques that are required to support spoken input and output in a large variety of languages. This book...
Laptops For Dummies Quick Reference (Computer/Tech)
Laptops For Dummies Quick Reference (Computer/Tech)
If you’re a part of the business world, chances are that you need to use a laptop for mobile computing. Newly revised and updated to serve as a valuable guide for anyone who operates a laptop computer, Laptops for Dummies Quick Reference, 2nd Edition is an indispensable guide that’s perfect for when you’re on...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Few topics in the information technology (IT) field today generate as much interest as
security. Interestingly, the IT world has been struggling with security issues for over 30
years, yet many security problems remain unsolved, unaddressed, and serious. As
those responsible for securing systems and networks address security issues
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy