CHAPTER 9Securing Reports

If a topic is currently on the minds of operating system makers, application developers, and system administrators more than security is, we would be hard-pressed to name it. We all know that security threats come in many flavors and levels of severity—from the innocuous pop-up Web pages to the invasive worms and viruses that wreak havoc on systems and take their toll on productivity by wasting time and resources.

These threats are often anonymous scripts or executables—automatons—that their human creator has released into the wild. But what about the security violations from real individuals? These are not just elusive system crackers bent on destruction; they can be the overlooked disgruntled employee who left the ...

Get Pro SQL Server 2008 Reporting Services now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.