September 2012
Intermediate to advanced
912 pages
24h 34m
English
By maintaining a strategy that is secure by design, secure by default, and secure in deployment, SQL Server 2012 allows for a much more effective method of design, implementation, and administration of security across resources and services provided by the SQL environment. Security permissions can be defined on a wide range of objects, from network endpoints that facilitate client communication, to execute permissions on a stored procedure, even down to the column level within a table. Complex security implementations can be efficiently controlled with granular role-based authorization and database schemas.
Administering SQL security is a key database administrator task that normally ...
Read now
Unlock full access