Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task. In ...
How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots Like so much of IT, database security requirements largely ...
Databases contain valuable business assets; ensuring this information is secure is paramount. SQL Compliance Manager by Idera can protect those assets and help address your industry’s strict ...
SQL Server has a long list of roles for server, database, and applications that outline things like permissions, data selection and modification, and disk management. Examine how roles play a part in ...
UPDATE: The story that originally got my attention has been updated in all of the places I could still find it yesterday, so I’m pulling my references to the story and just focusing on the positive ...
Many web-facing enterprise applications have databases sitting behind them. For many of those, the application itself is little more than a snazzy user interface sitting on top of a database. And in ...
Despite the plentiful information in Books Online and on the official “SQL Server 2000 Security” document Microsoft offers online, setting up a truly secure SQL Server remains a difficult task. In ...