Mastering SQL Server 2000 Security (Gearhead Press -- In the Trenches)
Buy Rights Online Buy Rights

Rights Contact Login For More Details

More About This Title Mastering SQL Server 2000 Security (Gearhead Press -- In the Trenches)

English

MIKE YOUNG is Vice President of SofTouch, Inc., a Microsoft CTEC (Certified Training Education Center). He has been instructing trainers, corporations, and individuals on Microsoft Back Office products and Oracle databases for more than six years.
CURTIS W. YOUNG is President of SofTouch. A former CPA, Curtis has been designing courseware and training developers in Visual Studio and BackOffice for a decade.

About Gearhead Press
Responding to the ongoing needs of IT professionals for current and reliable information on the latest technologies, Wiley Technology Publishing introduces the Gearhead Press titles. These books, written by accomplished trainers in their respective fields, focus on real-world examples and case studies to give readers the best information on leading topics. The Gearhead Press titles are characterized by two imprints: In the Trenches and Point to Point. Both imprints include fast-paced books written by fellow IT professionals who have been there and done that. In the Trenches books guide readers to proficiency, and serve as practical, hands-on references after the initial tasks are accomplished. The Point to Point titles invite readers to join an IT team at a model company and implement technologies in real-world environments-demonstrating actual problems and solutions.

English

Acknowledgments.

Introduction.

About the Authors.

Chapter 1. Introducing SQL Server Security.

Chapter 2. Designing a Successful Security Model.

Chapter 3. Exploring Initial Security Parameters.

Chapter 4. Establishing Login Security.

Chapter 5. Managing Object Security.

Chapter 6. Designing Application Security.

Chapter 7. Inplementing Front-End Application Security.

Chapter 8. Implementing Microsoft's Enterprise Development Strategy.

Chapter 9. Introducing the SQL Server Agent Service.

Chapter 10. Managing Distributed Data Security.

Chapter 11. Managing Data Transformation Services.

Chapter 1. Exploring Analysis Services Security.

Chapter 13. Managing Current Connections.

Chapter 14.Creating an Audit Policy.

Chapter 15. Managing Internet Security.

Appendix A: XML for SQL Server 2000.

Appendix B. Third-Party SQL Server Security Management Tools.

Appendix C: Answers to Review Questions.

Index.
loading