Đang chuẩn bị liên kết để tải về tài liệu:
Microsoft SQL Server 2008 R2 Unleashed- P2

Không đóng trình duyệt đến khi xuất hiện nút TẢI XUỐNG

Microsoft SQL Server 2008 R2 Unleashed- P2:SQL Server 2005 provided a number of significant new features and enhancements over what was available in SQL Server 2000. This is not too surprising considering there was a five-year gap between these major releases.Microsoft SQL Server 2008 is not as much of a quantum leap forward from SQL Server 2005 | x 11 Security and User Administration 291 What s New in Security and User Administration.291 An Overview of SQL Server Security.292 Authentication Methods.294 Windows Authentication Mode.294 Mixed Authentication Mode.294 Setting the Authentication Mode.295 Managing Principals.295 Logins.296 SQL Server Security Users.298 User Schema Separation.301 Roles.302 Managing Securables.309 Managing Permissions.311 Managing SQL Server Logins.313 Using SSMS to Manage Logins.313 Using T-SQL to Manage Logins.317 Managing SQL Server Users.318 Using SSMS to Manage Users.318 Using T-SQL to Manage Users.320 Managing Database Roles.321 Using SSMS to Manage Database Roles.321 Using T-SQL to Manage Database Roles.322 Managing SQL Server Permissions.322 Using SSMS to Manage Permissions.323 Using T-SQL to Manage Permissions.330 The Execution Context.331 Explicit Context Switching.332 Implicit Context Switching.333 Summary.334 12 Data Encryption 335 What s New in Data Encryption.336 An Overview of Data Security.336 An Overview of Data Encryption.338 SQL Server Key Management.339 Extensible Key Management.341 Column-Level Encryption.343 Encrypting Columns Using a Passphrase.344 Encrypting Columns Using a Certificate.346 Download from www.wowebook.com Contents xi Transparent Data Encryption.350 Implementing Transparent Data Encryption.351 Managing TDE in SSMS.352 Backing Up TDE Certificates and Keys.353 Limitations of TDE.355 Column-Level Encryption Versus Transparent Data Encryption.356 Summary.357 13 Security and Compliance 359 Exposure and Risk.360 Across the Life Cycle.361 The Security Big Picture.362 Identity Access Management Components.364 Compliance and SQL Server.366 SQL Server Auditing.368 Setting Up Auditing via T-SQL.372 SQL Injection Is Easy to Do.374 Summary.376 14 Database Backup and Restore 377 What s New in Database Backup and Restore.377 Developing a Backup and Restore Plan.378 Types of Backups.379 Full Database Backups.380 Differential Database Backups.380 Partial .

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.