Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title page Table of Contents Copyright Dedication Author Biography Technical Editor Biography Acknowledgments Introduction Chapter 1: Identifying Security Requirements
Abstract What are Security Objectives? When Should Security Objectives been Identified? How to Identify Security Objectives?
Chapter 2: Securing the Network
Abstract Securing the Network Public IP Addresses versus Private IP Addresses vLANs Accessing SQL Server from Home Physical Security Social Engineering Finding the Instances Testing the Network Security Antivirus Installation on SQL Servers Summary
Chapter 3: Key Management
Abstract Service Master Key Database Master Key Encryption Password Management Enterprise Key Management High Availability and Disaster Recovery for Key Management Conclusions
Chapter 4: Database Encryption
Abstract Database Encryption Encrypting Data within Tables Encrypting Data at Rest Encrypting Data on the Wire Encrypting Data with MPIO Drivers Encrypting Data via HBAs Summary
Chapter 5: SQL Password Security
Abstract Login Types SQL Server Password Security Strong Passwords Password Change Policies Renaming the SA Account Disabling the SA Account Users versus Logins Contained Database Users in SQL Server 2012 and Beyond Schemas Encrypting Client Connection Strings Application Roles Using Windows Domain Policies to Enforce Password Length Contained Users Summary
Chapter 6: Securing the Instance
Abstract What to Install, and When? SQL Authentication and Windows Authentication Password Change Policies Auditing Failed Logins Renaming the SA Account Disabling the SA Account Securing Endpoints Stored Procedures as a Security Measure Minimum Permissions Possible Instant File Initialization Linked Servers Using Policies to Secure Your Instance SQL Azure Specific Settings Instances that Leave the Office Securing AlwaysOn Availability Groups Securing Contained Databases SQL CLR Extended Stored Procedures Protecting Your Connection Strings Database Firewalls Clear Virtual Memory Pagefile User Access Control (UAC) Other Domain Policies to Adjust Summary
Chapter 7: Analysis Services
Abstract Logging into Analysis Services Securing Analysis Services Objects Summary
Chapter 8: Reporting Services
Abstract Setting up SSRS Security within Reporting Services Reporting Services Authentication Options Report Server Object Rights Summary
Chapter 9: SQL Injection Attacks
Abstract What is an SQL Injection Attack? Why are SQL Injection Attacks so Successful? How to Figure out you have been Attacked How to Protect Yourself from an SQL Injection Attack Cleaning up the Database after a SQL Injection Attack Other Front end Security Issues Using xEvents to Monitor for SQL Injection Summary
Chapter 10: Database Backup Security
Abstract Overwriting Backups Media set and Backup set Passwords Backup Encryption Transparent Data Encryption Compression and Encryption Offsite Backups Summary
Chapter 11: Storage Area Network Security
Abstract Securing the Array Securing the Storage Switches Summary
Chapter 12: Auditing for Security
Abstract Login Auditing Data Modification Auditing Data Querying Auditing Schema Change Auditing Using Policy-based Management to Ensure Policy Compliance C2 Auditing Common Criteria Compliance Summary
Chapter 13: Server Rights
Abstract SQL Server Service Account Configuration OS Rights Needed by the SQL Server Service OS Rights Needed by the DBA OS Rights Needed to Install Service Packs OS Rights Needed to Access SSIS Remotely Console Apps Must Die Fixed Server Roles User Defined Server Roles Fixed Database Roles User-defined Database Roles Default Sysadmin Rights Vendor’s and the Sysadmin Fixed Server Role Summary
Chapter 14: SQL Server Agent Security
Abstract Proxies SQL Agent Job Steps Granting Rights to Proxies Job Ownership Summary
Chapter 15: Securing Data
Abstract GRANTing Rights DENYing Rights REVOKEing Rights Table and view Permissions Stored Procedure Permissions Signing Stored Procedures, Functions and Triggers Function Permissions Service Broker Objects Separation of Duties Summary
Appendix A: External Audit Checklists Subject Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion