Chapter 7. Hardening and Auditing a SQL Server 2012 Implementation
SQL Server is regularly targeted by hackers because it is a repository of sensitive data for organizations. If the server is breached, hackers can gain access to confidential information, including credit cards, Social Security numbers, or sensitive customer data.
To prevent cybercrime or, at the very least, reduce it, Microsoft has been working very hard since 2002 to bring the community more secured products with the Microsoft Trustworthy Computing Initiative. Although Microsoft products are being transformed and are more secure by default and design because of Trustworthy Computing, the company is not delusional about where things stand today. Microsoft knows it must continue ...
Get Microsoft® SQL Server 2012 Management and Administration, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.