Curriculum development related to information security policies and procedures
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Database security curriculum in InfoSec program
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Finding security vulnerabilities in java applications with static analysis
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
2010 Information Security Curriculum Development Conference
Hi-index | 0.00 |
Addresses SQL Server vulnerabilities and provides security solutions. Covers installation, administration, and programming--plus security issues such as authentication, encryption, intrusion detection, and more. Written for IT professionals administering or programming any SQL Server-based application--includes coverage of SQL Server 7, SQL Server 2000, and SQL Server (Yukon). Table of contents 1: SQL Server Security: The Basics 2: Under Siege: How SQL Server Is Hacked 3: SQL Server Installation Tips 4: The Network-Libraries and Secure Connectivity 5: Authentication and Authorization 6: SQL Server in the Enterprise 7: Auditing and Intrusion Detection 8: Data Encryption 9: SQL Injection: When Firewalls Offer No Protection 10: Secure Architectures Appendix A: System and Extended Stored Procedure Reference Appendix B: Additional Technologies that Impact SQL Server Security Appendix C: Connection Strings Appendix D: Security Checklists