TAILIEUCHUNG - Microsoft SQL Server 2008 R2 Unleashed- P40

Microsoft SQL Server 2008 R2 Unleashed- P40:SQL Server 2005 provided a number of significant new features and enhancements over what was available in SQL Server 2000. This is not too surprising considering there was a five-year gap between these major SQL Server 2008 is not as much of a quantum leap forward from SQL Server 2005 | 334 CHAPTER 11 Security and User Administration Summary SQL Server 2008 continues the trend of providing more security and more flexible security to the SQL Server database environment. Several new enhancements have been added to SQL Server 2008 that add to the slew of security changes added to SQL Server 2005. The granularity of the permissions and the other security-related features covered in this chapter allow you to keep your SQL Server environment safe. Chapter 12 Data Encryption looks at another aspect of SQL Server that helps secure your database environment. It covers encryption methods that can be implemented to further protect your data from unauthorized access. Download from CHAPTER 12 Data Encryption W ith all the concern about identity theft these days there has been increasingly more attention paid to how all the Personally Identifiable Information PII and other sensitive information stored in databases is being protected. It is necessary to secure and protect this data to avoid any potential liability should the PII or sensitive data fall into the wrong hands and in some cases doing so may even be required by law for example Health Insurance Portability and Accountability Act or HIPAA requirements . Chapter 11 Security and User Administration discusses methods to secure and control the access to your SQL Server data via login and user security. This type of security is usually sufficient to prevent access to the data by anyone other than properly authorized users. But what if you need to prevent authorized users such as your database or server administrators from viewing sensitive data How can you protect sensitive data from hackers or in the event that a database backup is stolen One method is to encrypt the data. This chapter looks at two methods provided in SQL Server 2008 for encrypting data column-level encryption and transparent data encryption TDE . In addition to describing how to implement both methods the chapter presents

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.