CHAPTER 9

image

Database Security and Security Patterns

“If you want total security, go to prison. There you’re fed, clothed, given medical care and so on. The only thing lacking … is freedom.”

—Dwight D. Eisenhower

There are so many threats to your security that it is essential to remain ever vigilant—without ending up with your server in a bunker of lead wearing a tinfoil hat protecting data by keeping it completely inaccessible to any human eyes. Business needs connectivity to customers, and customers need connectivity to their data. Security is one of the most important tasks when setting up and creating a new application, yet it is often ...

Get Pro SQL Server 2012 Relational Database Design and Implementation now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.