Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protecting SQL Server Data

Protecting SQL Server Data, 9781906434274 (1906434271), Red gate, 2009

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These valuable, often sensitive, data assets are stored in a SQL Server database, and entrusted to the Database Administrator, who must use every weapon and strategy at his or her disposal in the "war" to protect this sensitive data from would-be hackers, phishers, rumor mongers and identity thieves. Encryption is one of the primary weapons with which this battle can be won, and yet it is treated with trepidation by many, who fear that it will prove "just another way for data to be lost" or "an unjustifiable cost on performance".

This book holds the key to "encryption without fear". In it, the author goes way beyond the usual demonstration of the SQL Server cryptographic functions. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, views and stored procedures, and then how to implement an efficient and secure data architecture using the available SQL encryption features, such as cell-level encryption, transparent data encryption and one-way encryption.

At each stage the author covers not only how the features work, but also described the situations when they are and are not suitable, and at all times stresses the steps that must be taken to ensure that the solution is maintainable.

Table of Contents

  • Chapter 01: Understanding Sensitive Data
  • Chapter 02: Data Classification and Roles
  • Chapter 03: Schema Architecture Strategies
  • Chapter 04: Encryption Basics for SQL Server
  • Chapter 05: Cell-level Encryption
  • Chapter 06: Transparent Data Encryption
  • Chapter 07: One-way Encryption
  • Chapter 08: Obfuscation
  • Chapter 09: HoneyCombing a Database
  • Chapter 10: Layering Solutions
  • Appendix A: Views and Functions Reference
  • Appendix B: The HomeLending Database
(HTML tags aren't allowed.)

The Puzzle of Orofacial Pain: Integrating Research into Clinical Management (Pain and Headache, Vol. 15)
The Puzzle of Orofacial Pain: Integrating Research into Clinical Management (Pain and Headache, Vol. 15)

In recent years, progress in pain research has yielded substantial new insights, and this has profoundly altered our understanding of various orofacial pain conditions. Written by renowned international researchers and clinicians, this state-of-the-art textbook presents recent advances in the understanding of orofacial pain and offers...

Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
XPath 2.0 Programmer's Reference (Programmer to Programmer)
XPath 2.0 Programmer's Reference (Programmer to Programmer)
From its origins as a sublanguage of XSLT, XPath has come into its own as a key element of XML. XPath 2.0 has emerged as a robust language twice the size of its predecessor, complex and capable of standing on its own.

This substantive volume, by the editor of the W3C® XSLT 2.0 specification, is the authoritative reference on XPath 2.0. It...

Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming (Programmer to Programmer)
Professional Windows Vista Gadgets Programming

As an easy-to-use application that provides information at a glance, a gadget basically takes the concept of portal dashboards and moves them to the more accessible Windows desktop where users can quickly and easily obtain weather information, RSS news feeds, and much more. In...

Frame Relay for High-Speed Networks
Frame Relay for High-Speed Networks
Emerging new applications for a mature technology. Frame relay has recently emerged as a popular interface choice for today's high-speed services, including videoconferencing, SNA networking, voice-over data, and high-speed Internet access itself. Stressing services rather than bits and bytes, this book reexamines this mature technology in light of...
EJB 3 in Action
EJB 3 in Action


Building on the bestselling first edition, EJB 3 in Action, Second Edition tackles EJB 3.2 head-on, through numerous code samples, real-life scenarios, and illustrations. This book is a fast-paced tutorial for Java EE 6 business component development using EJB 3.2, JPA 2, and CDI. Besides covering...

©2020 LearnIT (support@pdfchm.net) - Privacy Policy