O'Reilly logo

Microsoft® SQL Server 2012 Management and Administration, Second Edition by Ross Mistry

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Hardening and Auditing a SQL Server 2012 Implementation

SQL Server is regularly targeted by hackers because it is a repository of sensitive data for organizations. If the server is breached, hackers can gain access to confidential information, including credit cards, Social Security numbers, or sensitive customer data.

To prevent cybercrime or, at the very least, reduce it, Microsoft has been working very hard since 2002 to bring the community more secured products with the Microsoft Trustworthy Computing Initiative. Although Microsoft products are being transformed and are more secure by default and design because of Trustworthy Computing, the company is not delusional about where things stand today. Microsoft knows it must continue ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required