Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting SQL Server Data

Protecting SQL Server Data, 9781906434274 (1906434271), Red gate, 2009

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These valuable, often sensitive, data assets are stored in a SQL Server database, and entrusted to the Database Administrator, who must use every weapon and strategy at his or her disposal in the "war" to protect this sensitive data from would-be hackers, phishers, rumor mongers and identity thieves. Encryption is one of the primary weapons with which this battle can be won, and yet it is treated with trepidation by many, who fear that it will prove "just another way for data to be lost" or "an unjustifiable cost on performance".

This book holds the key to "encryption without fear". In it, the author goes way beyond the usual demonstration of the SQL Server cryptographic functions. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views and stored procedures, and then how to implement an efficient and secure data architecture using the available SQL encryption features, such as cell-level encryption, transparent data encryption and one-way encryption.

At each stage the author covers not only how the features work, but also described the situations when they are and are not suitable, and at all times stresses the steps that must be taken to ensure that the solution is maintainable.

Table of Contents

  • Chapter 01: Understanding Sensitive Data
  • Chapter 02: Data Classification and Roles
  • Chapter 03: Schema Architecture Strategies
  • Chapter 04: Encryption Basics for SQL Server
  • Chapter 05: Cell-level Encryption
  • Chapter 06: Transparent Data Encryption
  • Chapter 07: One-way Encryption
  • Chapter 08: Obfuscation
  • Chapter 09: HoneyCombing a Database
  • Chapter 10: Layering Solutions
  • Appendix A: Views and Functions Reference
  • Appendix B: The HomeLending Database
(HTML tags aren't allowed.)

iPad Apps For Kids For Dummies
iPad Apps For Kids For Dummies

Get the scoop on the best kid-friendly apps iPad has to offer!

How do you find good apps for your children? Read iPad Apps For Kids For Dummies, that's how! With over a half-million apps in the App Store and that number growing, this great new guide cuts through the clutter and points parents in the direction of...

Digital Government: Principles and Best Practices
Digital Government: Principles and Best Practices

E-government has emerged not merely as a specialization in public administration but as a transformative force affecting all leaves and functions in government. Digital Government: Principles and Best Practices, written by a collection of practitioners and researchers, provides an overview of the management challenges and issues...

Mobile Interaction Design
Mobile Interaction Design
Computers anytime, anyplace. This long-term research goal is daily becoming more and more of a
focused reality. The mobiles are amongst us. And devices we carry around in our pockets are more
powerful than those on board the rockets that took the first people to the moon. But where are
we going, today? How should these handhelds,

Google Maps Mashups with Google Mapplets (Firstpress)
Google Maps Mashups with Google Mapplets (Firstpress)
Have a Google Maps mashup that you’d like to expose to millions of users on maps.google.com? New to the mapping craze, but have an idea for a killer map–based application? Want to learn how to create GeoRSS and KML feeds with your geotagged content, exposing your customer to new ways of exploring and navigating your content?...
Virtual Reality Technology and Applications (Intelligent Systems, Control and Automation: Science and Engineering)
Virtual Reality Technology and Applications (Intelligent Systems, Control and Automation: Science and Engineering)

As virtual reality expands from the imaginary worlds of science fiction and pervades every corner of everyday life, it is becoming increasingly important for students and professionals alike to understand the diverse aspects of this technology. This book aims to provide a comprehensive guide to the theoretical and practical elements of...

Photoshop CS3 Extended Video and 3D Bible
Photoshop CS3 Extended Video and 3D Bible
Harness the powerful new capabilities of Photoshop CS3 Extended

When you think of editing 3D images, if your first thought isn't Photoshop's filters, styles, and paint tools, think again. Now you can apply your Photoshop skills to 3D and video with Photoshop's new CS3 Extended and the in-depth instruction in this comprehensive guide. Want to...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy