O'Reilly logo

Microsoft® SQL Server 2012 Unleashed by Alex T. Silverstein, Chris Gallelli, Paul T. Bertucci, Ray Rankins

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

Chapter 17 discussed methods to secure and control the access to your SQL Server data via login and user security to prevent unauthorized users from accessing your SQL Server instances and databases. Column-level encryption, as discussed here, takes these protections a step further by preventing authorized users, such as your database or server administrators, from viewing sensitive data within a database. Transparent data encryption protects all your data from being accessed by unauthorized users in the event that your database files or backups are lost or stolen.

In Part V, “Database Administration,” we cover the topics related to creating and managing the objects and structures in your databases that you will want to protect using ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required