O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to Cheat at Securing SQL Server 2005

Book Description

The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005.

SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.
  • Provides the multi-tasked Sys Admin with the essential information needed to perform the daily tasks
  • Covers SQL Server 2005, which is a massive product with significant challenges for IT managers
  • Emphasizes best-practice security measures

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright page
  5. Technical Editor
  6. Contributors
  7. Companion Web Site
  8. Chapter 1: Introduction to SQL Server Security
    1. Introduction
    2. Security: Why Worry About It?
    3. Installing SQL Server
    4. Building Security into Your Application
    5. Managed Code
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  9. Chapter 2: Surface Area Reduction
    1. Introduction
    2. SQL Server Surface Area
    3. Summary
    4. Solutions Fast Track
    5. Frequently Asked Questions
  10. Chapter 3: Roles
    1. Introduction
    2. Roles
    3. Situational Examples
    4. Summary
    5. Solutions Fast Track
    6. Frequently Asked Questions
  11. Chapter 4: Authentication and Granular Access
    1. Introduction
    2. Understanding the SQL Server Authentication Modes
    3. Endpoint Security
    4. Configuring Kerberos Support for Your SQL Server
    5. Auditing Authentication Attempts
    6. Understanding Granular Access
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  12. Chapter 5: Schemas
    1. Introduction
    2. Understanding Schemas
    3. Changes Due to the User-Schema Separation
    4. Designing Schemas
    5. Managing Schemas
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  13. Chapter 6: Password Policies
    1. Introduction
    2. Password Policies in SQL Server 2005
    3. SQL Server Scenarios
    4. Summary
    5. Solutions Fast Track
    6. Frequently Asked Questions
  14. Chapter 7: DDL Triggers
    1. Introduction
    2. DDL Triggers Explained
    3. Implementing DDL Triggers
    4. Managing DDL Triggers
    5. Scenarios for Deploying DDL Triggers
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  15. Chapter 8: Data Encryption
    1. Introduction
    2. Data Encryption Explained
    3. Summary
    4. Solutions Fast Track
    5. Frequently Asked Questions
  16. Chapter 9: Reporting Services, Analysis Services, and Integration Services
    1. Introduction
    2. General SQL Server Best Security Practices
    3. Securing Reporting Services
    4. Securing Analysis Services
    5. Securing Integration Services
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  17. Appendix A: Group Policies
    1. Group Policies Overview
    2. Software Installation and Maintenance
    3. Summary
    4. Solutions Fast Track
    5. Frequently Asked Questions
  18. Appendix B: Securing Active Directory
    1. Introduction
    2. Designing an Access Control Strategy for Directory Services
    3. Designing the Appropriate Group Strategy for Accessing Resources
    4. Summary
    5. Solutions Fast Track
    6. Frequently Asked Questions
  19. Index