Securing SQL server : (Record no. 2340)

000 -LEADER
fixed length control field 01857cam a22002534a 4500
001 - CONTROL NUMBER
control field 16592102
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101228s2011 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010049453
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781597496254 (pbk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1597496251 (pbk.)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Transcribing agency DLC
Modifying agency YDX
-- BTCTA
-- YDXCP
-- MLY
-- ITD
-- CDX
-- VP@
-- DLC
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.73.S67
Item number C478 2011
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Cherry, Denny.
245 10 - TITLE STATEMENT
Title Securing SQL server :
Remainder of title protecting your database from attackers /
Statement of responsibility, etc. Denny Cherry ; Thomas Larock, technical editor.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Burlington, MA :
Name of publisher, distributor, etc. Syngress,
Date of publication, distribution, etc. c2011.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 250 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Machine generated contents note: Chapter 1: Securing the Network Chapter 2: Database Encryption Chapter 3: SQL Password Security Chapter 4: Securing the Instance Chapter 5: Additional Security for an Internet Facing SQL Server and Application Chapter 6: SQL Injection Attacks Chapter 7: Database Backup Security Chapter 8: Auditing for Security Chapter 9: Server Rights Appendix A: External Audit Checklists .
520 ## - SUMMARY, ETC.
Summary, etc. "There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment"--
Assigning source Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Client/server computing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Database security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Full call number Barcode Date last seen Price effective from Koha item type
          TUNGUU LENDING LIBRARY TUNGUU LENDING LIBRARY 2020-02-19 005.8 L000000873 2020-02-19 2020-02-19 Books

Powered by Koha