by
Cherry, Denny.
Format:
Electronic Resources
Excerpt:
Securing SQL server : protecting your database from attackers / Cherry, Denny.
by
ScienceDirect (Online service)
Format:
Electronic Resources
Excerpt:
How to cheat at securing sql server 2005 ScienceDirect (Online service)
View Other Search Results
by
Bruchez, Rudi.
Format:
Electronic Resources
Excerpt:
Microsoft SQL Server 2012 Security Cookbook. Bruchez, Rudi.
by
Pollack, Edward, author.
Format:
Electronic Resources
Excerpt:
Dynamic SQL : applications, performance, and security in Microsoft SQL server / Pollack, Edward
by
Cherry, Denny.
Format:
Electronic Resources
Excerpt:
SQL server.
by
XYPRO Technology Corporation.
Format:
Electronic Resources
Excerpt:
) -- Chapter 6 - ODBC -- Chapter 7 - SQL/MX -- Part 3 - The Guardian Gazette A Z -- {dollar}ZPMON -- Itanium
by
Ben-Natan, Ron.
Format:
Electronic Resources
Excerpt:
- examples that pertain to Oracle, SQL Server, DB2, Sybase and even MySQL.. * Many of the techniques you will
by
Haidar, Bilal.
Format:
Electronic Resources
Excerpt:
Directory-Based Policy Store -- Using a Microsoft SQL Server Database-Based Policy Store -- Working in Partial
by
Simpson, Michael T.
Format:
Electronic Resources
Excerpt:
Internet File System -- Null Sessions -- Web Services -- SQL Server -- Buffer Overflows -- Passwords and
by
Nordström, Kent.
Format:
Electronic Resources
Excerpt:
-- Directory replication -- Password reset -- Creating AD MA -- HR (SQL Server) -- Creating SQL MA -- Run
by
Shema, Mike.
Format:
Electronic Resources
Excerpt:
Injection Cross Site Scripting Logic Attacks Server Misconfigurations Predictable Pages Web of Distrust
by
Musumeci, Guillermo.
Format:
Electronic Resources
Excerpt:
-- Configuring XenApp Using the Wizard-based Server Configuration Tool -- Configuring the first XenApp server of
Limit Search Results
Narrowed by: