Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting SQL Server Data

Buy
Protecting SQL Server Data, 9781906434274 (1906434271), Red gate, 2009

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These valuable, often sensitive, data assets are stored in a SQL Server database, and entrusted to the Database Administrator, who must use every weapon and strategy at his or her disposal in the "war" to protect this sensitive data from would-be hackers, phishers, rumor mongers and identity thieves. Encryption is one of the primary weapons with which this battle can be won, and yet it is treated with trepidation by many, who fear that it will prove "just another way for data to be lost" or "an unjustifiable cost on performance".

This book holds the key to "encryption without fear". In it, the author goes way beyond the usual demonstration of the SQL Server cryptographic functions. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views and stored procedures, and then how to implement an efficient and secure data architecture using the available SQL encryption features, such as cell-level encryption, transparent data encryption and one-way encryption.

At each stage the author covers not only how the features work, but also described the situations when they are and are not suitable, and at all times stresses the steps that must be taken to ensure that the solution is maintainable.

Table of Contents

  •  
  • Chapter 01: Understanding Sensitive Data
  • Chapter 02: Data Classification and Roles
  • Chapter 03: Schema Architecture Strategies
  • Chapter 04: Encryption Basics for SQL Server
  • Chapter 05: Cell-level Encryption
  • Chapter 06: Transparent Data Encryption
  • Chapter 07: One-way Encryption
  • Chapter 08: Obfuscation
  • Chapter 09: HoneyCombing a Database
  • Chapter 10: Layering Solutions
  • Appendix A: Views and Functions Reference
  • Appendix B: The HomeLending Database
(HTML tags aren't allowed.)

Hands-on Azure Repos: Understanding Centralized and Distributed Version Control in Azure DevOps Services
Hands-on Azure Repos: Understanding Centralized and Distributed Version Control in Azure DevOps Services
Use Azure Repos to manage your code in both centralized and distributed version control systems. This book will show you how to work with Team Foundation Version Control (TFVC) and distributed version control (Git), while exploring their best practices. 

You'll start with an introduction
...
Distributed Programming Paradigms with Cryptography Applications
Distributed Programming Paradigms with Cryptography Applications
This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application programs can be developed by simple substitution of data structures and sequential procedures. The author introduces generic programs for two paradigms and shows how to derive new distributed programs...
Remote Sensing Digital Image Analysis: An Introduction
Remote Sensing Digital Image Analysis: An Introduction

Remote Sensing Digital Image Analysis provides the non-specialist with an introduction to quantitative evaluation of satellite and aircraft derived remotely retrieved data. Since the first edition of the book there have been significant developments in the algorithms used for the processing and analysis of remote sensing imagery; nevertheless...


Everyday Data Structures
Everyday Data Structures

A practical guide to learning data structures simply and easily

About This Book

  • This book is a very practical, friendly, and useful guide that will help you analyze problems and choose the right data structures for your solution
  • Learn to recognize data patterns for determining which...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Microsoft Office Access 2007: The Complete Reference
Microsoft Office Access 2007: The Complete Reference
The Ultimate Microsoft Office Access 2007 Resource

Build a highly responsive a database so you can track, report, and share information and make more informed decisions. This comprehensive resource shows you how to design and develop custom Access 2007 databases--even if you have little or no programming experience. You'll...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy