Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting SQL Server Data

Protecting SQL Server Data, 9781906434274 (1906434271), Red gate, 2009

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These valuable, often sensitive, data assets are stored in a SQL Server database, and entrusted to the Database Administrator, who must use every weapon and strategy at his or her disposal in the "war" to protect this sensitive data from would-be hackers, phishers, rumor mongers and identity thieves. Encryption is one of the primary weapons with which this battle can be won, and yet it is treated with trepidation by many, who fear that it will prove "just another way for data to be lost" or "an unjustifiable cost on performance".

This book holds the key to "encryption without fear". In it, the author goes way beyond the usual demonstration of the SQL Server cryptographic functions. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views and stored procedures, and then how to implement an efficient and secure data architecture using the available SQL encryption features, such as cell-level encryption, transparent data encryption and one-way encryption.

At each stage the author covers not only how the features work, but also described the situations when they are and are not suitable, and at all times stresses the steps that must be taken to ensure that the solution is maintainable.

Table of Contents

  • Chapter 01: Understanding Sensitive Data
  • Chapter 02: Data Classification and Roles
  • Chapter 03: Schema Architecture Strategies
  • Chapter 04: Encryption Basics for SQL Server
  • Chapter 05: Cell-level Encryption
  • Chapter 06: Transparent Data Encryption
  • Chapter 07: One-way Encryption
  • Chapter 08: Obfuscation
  • Chapter 09: HoneyCombing a Database
  • Chapter 10: Layering Solutions
  • Appendix A: Views and Functions Reference
  • Appendix B: The HomeLending Database
(HTML tags aren't allowed.)

New Ecoinformatics Tools in Environmental Science: Applications and Decision-making (Environmental Earth Sciences)
New Ecoinformatics Tools in Environmental Science: Applications and Decision-making (Environmental Earth Sciences)

This book provides new insights on the study of global environmental changes using the ecoinformatics tools and the adaptive-evolutionary technology of geoinformation monitoring. The main advantage of this book is that it gathers and presents extensive interdisciplinary expertise in the parameterization of global biogeochemical cycles and...

MATLAB Differential Equations
MATLAB Differential Equations

MATLAB is a high-level language and environment for numerical computation, visualization, and programming. Using MATLAB, you can analyze data, develop algorithms, and create models and applications. The language, tools, and built-in math functions enable you to explore multiple approaches and reach a solution faster than with spreadsheets or...

An Introduction to Network Programming with Java: Java 7 Compatible
An Introduction to Network Programming with Java: Java 7 Compatible

Since the second edition of this text, the use of the Internet and networks generally has continued to expand at a phenomenal rate. This has led to both an increase in demand for network software and to improvements in the technology used to run such networks, with the latter naturally leading to changes in the former. During this time, the...

Complete MBA For Dummies (Business & Personal Finance)
Complete MBA For Dummies (Business & Personal Finance)
"with this friendly guide, everyone can sample the benefits of an MBA education in a fraction of the time and at much less cost" (Business a.m., 5 November 2002)

Want to get an MBA? The Complete MBA For Dummies, 2nd Edition, is the practical, plain-English guide that covers all the basics of a
Developing Web Services with Java APIs for XML (JAX Pack) with CDROM
Developing Web Services with Java APIs for XML (JAX Pack) with CDROM
It should come as no surprise to someone reading this foreword that two of the most
influential forces in information systems over the last few years have been Java and
XML. Java provides a stable, industrial-strength language that runs on a variety of
platforms, while XML offers a simple format for the exchange of information
Fundamentals of Ultra-Thin-Body MOSFETs and FinFETs
Fundamentals of Ultra-Thin-Body MOSFETs and FinFETs

Understand the theory, design and applications of the two principal candidates for the next mainstream semiconductor-industry device with this concise and clear guide to FD/UTB transistors. • Describes FD/SOI MOSFETs and 3-D FinFETs in detail • Covers short-channel effects, quantum-mechanical effects, applications of UTB devices to...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy