000856567 000__ 04558cam\a2200469Mi\4500 000856567 001__ 856567 000856567 005__ 20230306145143.0 000856567 006__ m\\\\\o\\d\\\\\\\\ 000856567 007__ cr\un\nnnunnun 000856567 008__ 181124s2018\\\\cau\\\\\o\\\\\000\0\eng\d 000856567 020__ $$a9781484241615$$q(electronic book) 000856567 020__ $$a1484241614$$q(electronic book) 000856567 020__ $$z9781484241608 000856567 035__ $$aSP(OCoLC)on1076239224 000856567 035__ $$aSP(OCoLC)1076239224 000856567 040__ $$aEBLCP$$beng$$erda$$epn$$cEBLCP$$dGW5XE$$dOCLCQ$$dYDXIT 000856567 049__ $$aISEA 000856567 050_4 $$aQA76.9.D314$$bC37 2018 000856567 08204 $$a005.8$$223 000856567 1001_ $$aCarter, Peter A.,$$eauthor. 000856567 24510 $$aSecuring SQL Server :$$bDBAs Defending the Database /$$cPeter A. Carter. 000856567 250__ $$aSecond edition. 000856567 264_1 $$a[Berkeley, CA] :$$bApress L.P.,$$c[2018] 000856567 300__ $$a1 online resource (354 pages) 000856567 336__ $$atext$$btxt$$2rdacontent 000856567 337__ $$acomputer$$bc$$2rdamedia 000856567 338__ $$aonline resource$$bcr$$2rdacarrier 000856567 500__ $$aProtecting User Accounts. 000856567 5050_ $$aIntro; Table of Contents; About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Part I: Database Security; Chapter 1: Threat Analysis and Compliance; Threat Modeling; Understanding Threat Modeling; Identifying Assets; Creating an Architecture Overview; Creating the Infrastructure Components; Identifying the Technology Stack; Creating a Security Profile; Identifying Threats; Understanding STRIDE; Using STRIDE; Rating Threats; Understanding Threat Rating Methodologies; Understanding DREAD Methodology; Using DREAD Methodology; Creating Countermeasures. 000856567 5058_ $$aCompliance ConsiderationsIntroducing SOX for SQL Server; Introducing GDPR For SQL Server; Summary; Chapter 2: SQL Server Security Model; Security Principal Hierarchy; Instance Level Security; Logins; Creating a Login; Migrating Logins Between Instances; Server Roles; Credentials; Database-Level Security; Users; Users With a Login; Users Without a Login; Database Roles; Summary; Chapter 3: SQL Server Audit; Understanding SQL Server Audit; SQL Server Audit Actions and Action Groups; Implementing SQL Server Audit; Creating a Server Audit; Create a Server Audit Specification. 000856567 5058_ $$aCreate a Database Audit SpecificationCreating Custom Audit Events; Creating the Server Audit and Database Audit Specification; Raising the Event; Summary; Chapter 4: Data-Level Security; Schemas; Ownership Chaining; Impersonation; Row-Level Security; Security Predicates; Security Policies; Implementing RLS; Dynamic Data Masking; Summary; Chapter 5: Encryption in SQL Server; Generic Encryption Concepts; Defense in Depth; Symmetric Keys; Asymmetric Keys; Certificates; Self-Signed Certificates; Windows Data Protection API; SQL Server Encryption Concepts; Master Keys; EKM and Key Stores. 000856567 5058_ $$aSQL Server Encryption HierarchyEncrypting Data; Encrypting Data With a Password or Passphrase; Encrypting Data with Keys and Certificates; Transparent Data Encryption; Considerations for TDE With Other Technologies; Implementing TDE; Administering TDE; Backing Up the Certificate; Migrating an Encrypted Database; Always Encrypted; Implementing Always Encrypted; Always Encrypted Limitations; Summary; Chapter 6: Security Metadata; Security Principal Metadata; Finding a User's Effective Permissions; Securable Metadata; Code Signing; Permissions Against a Specific Table; Audit Metadata. 000856567 5058_ $$aEncryption MetadataAlways Encrypted Metadata; TDE Metadata; Credentials Metadata; Securing Metadata; Risks of Metadata Visibility; Summary; Chapter 7: Implementing Service Accounts for Security; Service Account Types; Virtual Accounts; Managed Service Accounts; SQL Server Services; How Service Accounts Can Become Compromised; Designing a Pragmatic Service Account Strategy; Summary; Chapter 8: Protecting Credentials; Protecting the sa Account; DBA Steps to Mitigate the Risks; Disabling the sa Account; Renaming the sa Account; Ensuring Reputability; Enforcing Constant Password Changes. 000856567 506__ $$aAccess limited to authorized users. 000856567 588__ $$aDescription based on online resource; title from digital title page (viewed on December 13, 2018). 000856567 63000 $$aSQL server. 000856567 650_0 $$aDatabase security. 000856567 77608 $$iPrint version:$$aCarter, Peter A.$$tSecuring SQL Server : DBAs Defending the Database.$$dBerkeley, CA : Apress L.P., ©2018$$z9781484241608 000856567 852__ $$bebk 000856567 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-4161-5$$zOnline Access$$91397441.1 000856567 909CO $$ooai:library.usi.edu:856567$$pGLOBAL_SET 000856567 980__ $$aEBOOK 000856567 980__ $$aBIB 000856567 982__ $$aEbook 000856567 983__ $$aOnline 000856567 994__ $$a92$$bISE