SQL Clone
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in

Content with tags Security, Miscellaneous, SQL Server 7, Strategies Rss

   Items 1 to 4 of 4   

Conducting a SQL Server Operational Audit

Auditing, analyzing and documenting your SQL Server installation is becoming more important all the time, especially as more and more attention is being paid to the security of your environment. Chad Miller brings us a look at a framework and a sample document you can use in your environment to conduct an audit.   Read more...
By Chad Miller 2005/10/24 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 13,240 reads

The Case for SQL Logins - Part Two

In this follow up to one of our most popular articles, Andy responds to comments posted by readers and discusses how to manage SQL logins effectively in your applications.   Read more...
By Andy Warren 2002/08/19 | Source: SQLServerCentral.com | Category: administration
Rating: |  Discuss |   Briefcase | 6,780 reads

Worst Practices - Encrypting Data

Continuing with the Worst Practices Series: Steve Jones examines why encryption in the database is a bad idea.   Read more...
By Steve Jones 2002/01/08 | Source: SQLServerCentral.com | Category: security
Rating: |  Discuss |   Briefcase | 8,403 reads

Enforcing Security in Multi-Tier Applications

The major part of the article, however, is dedicated to a topic that often confuses people and leads to some of the strongest disagreements among IT professionals and developers: the benefits and drawbacks of enforcing security in the middle (or business) tier versus the data tier.   Read more...
By Additional Articles 2001/12/25 | Source: Microsoft MSDN | Category: security
Rating:  Rate this |   Briefcase | 1,732 reads
   Items 1 to 4 of 4   
administration (2)    
programming (2)    
best and worst practices (1)    
configuring (1)    
t-sql (1)    
worst practices (1)