SQL Server Security Distilled

Front Cover
Apress, Apr 5, 2004 - Computers - 376 pages

SQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern for all businesses. Securing SQL Server is one of the most important responsibilities of the SQL Server professional.

SQL Server Distilled, Second Edition is a very carefully researched, clearly explained book on securing SQL Server, by an author who knows SQL Server inside and out. If you follow the practical guidelines that are clearly set out in this book, then you stand a very good chance of making sure that the data stored in your database is secure and that the conversation between your applications and the database is secure (preventing SQL injection attacks, etc.). For example, any database administrator who implemented the security precautions detailed in the book would not have been affected by the infamous Slammer virus.

This second edition offers practical advice on how to implement good practices that will ward off future viruses before they are even created, and it contains new content that reflects all updates to SQL Server's security mechanisms.

 

Contents

A Security Roadmap
1
Options for Authorization
9
Summary
15
Authenticating Logins
17
Authentication in SQL Server 6 5
26
Authentication in SQL Server 7 0 and 2000
43
Managing Login Accounts
56
Server Roles
64
Limiting Access to the Server
188
Summary
207
Designing Security for Applications
211
The SQL Injection Attack
220
Designing Secure Applications
236
Summary
255
Securing Data Transformation Services
261
Creating DTS Packages
262

Summary
70
Database Security in SQL Server 6 5
73
Managing Database Permissions
83
Summary
106
Database Security in SQL Server 7 0
107
Managing Database Permissions
117
The Art of Assigning Permissions
130
Database Roles
137
Object Ownership
150
Summary
159
Securing Data on the Network
161
In Medias Res
166
Password Protecting DTS Packages
268
SQL Server Agent Account Permissions
281
Replication Security
285
Securing Snapshot Replication
289
Securing the Data Stream
299
Summary
305
Managing Security for SQL Server CE
307
Managing Security for SQL Server
309
Setting Up Remote Data Access
322
Appendix A References
333
Copyright

Other editions - View all

Common terms and phrases

About the author (2004)

Morris Lewis has been smitten with Structured Query Language since the first time his professor wrote SELECT * FROM AUTHORS on the chalkboard 14 years ago. He has worked with no other database server since he first installed SQL Server 4.21a on his 16MHZ Intel 386 computer with all of the 32 megabytes of RAM running Windows NT 3.51 many years ago. With the mantra, "It is O.K. to worry if they really are out to get you," he has focused on all aspects of securing Windows and SQL Server since he connected his first server to the Internet. Now, he runs a training and consulting company, Holistech Inc., which focuses on helping clients create better and more secure database applications, and teaching them how to avoid the mistakes that can lead to problems in the future.

Bibliographic information