O'Reilly logo

Professional Microsoft® SQL Server® 2008 Administration by Steven Wort, Ross LoForte, Wayne Snyder, Ketan Patel, Brian Knight

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

9.10. Summary

In this chapter, you learned how to secure your data and your Database Engine. We covered many ways to secure your data, whether through granular security or roles. Another mechanism assumes the attacker can get the sensitive data, but prevents the attacker from reading it due to encryption. Now that you know how to protect your SQL Server data, the next chapter explains how to enforce SQL Server configuration using Policy-Based Management.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required