Chapter 7. Hardening and Auditing a SQL Server 2012 Implementation

SQL Server is regularly targeted by hackers because it is a repository of sensitive data for organizations. If the server is breached, hackers can gain access to confidential information, including credit cards, Social Security numbers, or sensitive customer data.

To prevent cybercrime or, at the very least, reduce it, Microsoft has been working very hard since 2002 to bring the community more secured products with the Microsoft Trustworthy Computing Initiative. Although Microsoft products are being transformed and are more secure by default and design because of Trustworthy Computing, the company is not delusional about where things stand today. Microsoft knows it must continue ...

Get Microsoft® SQL Server 2012 Management and Administration, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.