CHAPTER 9

image

Database Security and Security Patterns

To be trusted is a greater compliment than being loved.

—George MacDonald, Scottish novelist

There are so many threats to your security that it is essential to remain ever vigilant—without ending up with your server in a bunker of lead, wearing a tinfoil hat and protecting data by keeping it completely inaccessible to even your users. Business needs connectivity to customers, and customers need connectivity to their data. With that having been said, security is a very important task when setting up and deploying a new application, yet it is often overlooked and dealt with late in the application ...

Get Pro SQL Server Relational Database Design and Implementation, Fifth Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.