• Complain

Peter A. Carter - Securing SQL Server: DBAs Defending the Database

Here you can read online Peter A. Carter - Securing SQL Server: DBAs Defending the Database full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2018, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Peter A. Carter Securing SQL Server: DBAs Defending the Database
  • Book:
    Securing SQL Server: DBAs Defending the Database
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2018
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Securing SQL Server: DBAs Defending the Database: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Securing SQL Server: DBAs Defending the Database" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The multi-layered approach in this book helps ensure that a single breach does not lead to loss or compromise of confidential, or business sensitive data.
Database professionals in todays world deal increasingly with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your companys data secure. Securing SQL Server demonstrates how developers, administrators and architects can all play their part in the protection of their companys SQL Server enterprise.
This book not only provides a comprehensive guide to implementing the security model in SQL Server, including coverage of technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security, but also looks at common forms of attack against databases, such as SQL Injection and backup theft, with clear, concise examples of how to implement countermeasures against these specific scenarios. Most importantly, this book gives practical advice and engaging examples of how to defend your data, and ultimately your job, against attack and compromise.

What Youll Learn
  • Perform threat analysis
  • Implement access level control and data encryption
  • Avoid non-reputability by implementing comprehensive auditing
  • Use security metadata to ensure your security policies are enforced
  • Mitigate the risk of credentials being stolen
  • Put countermeasures in place against common forms of attack

Who This Book Is For
Database administrators who need to understand and counteract the threat of attacks against their companys data, and useful for SQL developers and architects

Peter A. Carter: author's other books


Who wrote Securing SQL Server: DBAs Defending the Database? Find out the surname, the name of the author of the book and a list of all author's works by series.

Securing SQL Server: DBAs Defending the Database — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Securing SQL Server: DBAs Defending the Database" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Peter A Carter Securing SQL Server DBAs Defending the Database 2nd ed - photo 1
Peter A. Carter
Securing SQL Server DBAs Defending the Database 2nd ed.
Peter A Carter London UK Any source code or other supplementary material - photo 2
Peter A. Carter
London, UK

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/9781484241608 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-4160-8 e-ISBN 978-1-4842-4161-5
https://doi.org/10.1007/978-1-4842-4161-5
Library of Congress Control Number: 2018963673
Peter A. Carter 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc. is a Delaware corporation.

This book is for Danielle Cartermy favorite Disney villain

Introduction

With repeated, high-profile data security breaches hitting the headlines, security is moving increasingly to the forefront of the minds of data professionals.

SQL Server provides a broad and deep set of security features that allow you to reduce the attack surface of your SQL Server instance, with defense-in-depth and principles of least privilege strategies.

The attack surface of SQL Server refers to the set of features and windows services, which attackers can (and will) attempt to exploit to either steal data or reduce the availability of data and services.

Defense-in-depth is a strategy used across the IT industry, where multiple layers of security are put in place. The idea is that if one layer of security is breached, then another layer will stop the attacker in their tracks.

To fully protect data against attack, SQL Server DBAs, developers, and architects alike must all understand how and when to implement each of the security features that SQL Server offers. This book attempts to address these topics.

The first section of this book begins by looking at how to holistically model threats before deep-diving into each of SQL Servers main areas of security, providing examples of how to implement each technology.

The second section of this book demonstrates some of the common threats that DBAs may face and how to guard against them. There is always an ethical question around revealing how attackers may try to penetrate your systems, but without knowledge and understanding of vulnerabilities that may be exploited, all too many DBAs do not implement the security measures that could easily avoid attacks from being successful. Every attack type discussed in this book is followed by a demonstration of how to use out-of-the-box SQL Server technologies to proactively stop the attacks occurring.

Many of the code examples in this book use the WideWorldImporters database. This database can be downloaded from github.com/Microsoft/sql-server-samples/releases/download/wide-world-importers-v1.0/WideWorldImporters-Full.bak

Some chapters also refer to CarterSecureSafe. This is a fictional company and product, which is purely designed to illustrate points made within this book.

Acknowledgments

I would like to thank Mark Burnett (xato.net) for allowing me to use his weak password list in this book.

I would also like to thank Ian Stirk, for a really good technical review, which has had a positive impact on the quality of this book.

Table of Contents
Part I: Database Security
Part II: Threats and Countermeasures
About the Author and About the Technical Reviewer
About the Author
Peter A. Carter
is an SQL Server expert with over 15 years experience in database development - photo 3

is an SQL Server expert with over 15 years experience in database development, administration, and platform engineering. He is currently a consultant based in London. Peter has written several books across a variety of SQL Server topics, including security, high availability, automation, administration, and working with complex data types.

About the Technical Reviewer
Ian Stirk
is a freelance SQL Server consultant based in London In addition to his day - photo 4

is a freelance SQL Server consultant based in London. In addition to his day job, he is an author, creator of software utilities, and technical reviewer who regularly writes book reviews for www.i-programmer.info .

He covers every aspect of SQL Server and has a specialist interest in performance and scalability. If you require help with your SQL Server systems, feel free to contact him at ian_stirk@yahoo.com or www.linkedin.com/in/ian-stirk-bb9a31 .

Ian would like to thank Peter Carter, Jonathan Gennick, and Jill Balzano for making this book experience easier for him.

None of us stands alone, and with this in mind, Ian would like to thank these special people: Kemi Amos, Malcolm Smith, John Lewis, Alan Crosby, Penny Newman, Tony Pugh, Stephen Cockburn, Jennifer Warner, John Woods, Tina Vick, Catherine Valentin, Stephen Johnson, Martin Fallon, Sizakele Phumzile Mtshali, Mark Hardman, Mark Northern, Ruhina Kabani, Peter Coombes, Lucy Mwangi, Silvia Alvarado, and Keila Fialho.

Ians fee for his work on this book has been donated to the GiveWell charities ( www.givewell.org/charities/top-charities/ ).

Part I Database Security
Peter A. Carter 2018
Peter A. Carter Securing SQL Server https://doi.org/10.1007/978-1-4842-4161-5_1
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Securing SQL Server: DBAs Defending the Database»

Look at similar books to Securing SQL Server: DBAs Defending the Database. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Securing SQL Server: DBAs Defending the Database»

Discussion, reviews of the book Securing SQL Server: DBAs Defending the Database and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.