Your Field Guide To Designing Security Into Networking Protocols
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
2006-12-19
1,808 reads
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
2006-12-19
1,808 reads
Download a 108-page eBook in which Phil Factor lifts the lid on the victories, defeats and absurdities of a career spent in the rough-and-tumble of the IT industry. The paperback will to available to buy from Lulu.com shortly ($25), but the eBook is free for registered Simple-Talk.com users
2006-12-18
2,529 reads
2006-12-18
1,665 reads
This article is meant to explore these architectural issues from the bottom up, and aims to guide you through this new world. In the long run, new programming models are likely to appear that will abstract away a lot of the challenges you will encounter.
2006-12-15
2,929 reads
We have hosted a number of articles on various aspects of being a DBA, but we have usually focused on production or development DBA. New data warehousing DBA Janet Wong brings us a look at another type of DBA, the data warehouse DBA and the skills they need.
2006-12-14
9,719 reads
In this article I will discuss some new ideas that can result in either modifying SQL statements or injecting SQL code even if the code has escaped the delimiting characters. I will start with some best practices for constructing delimited identifiers and SQL literals, and then I'll show you new ways attackers can inject SQL code in order to help you protect your applications.
2006-12-14
4,373 reads
Check out SSIS, the SQL Server 2005 replacement for the older Data Transformation Services. You might find SSIS to be a great solution for automating SQL Server.
2006-12-13
2,992 reads
With Windows 2003 now clustered, you're ready to begin to clustering SQL Server 2005. In this presentation, you'll see how to cluster SQL Server 2005 and some best practices in how to configure the SQL Server cluster after the fact.
2006-12-12
3,765 reads
The suggested method illustrates a way how such tampering by an authorized user can be detected. While this method doesn't provide tamper-prevention measures, but as there is no such thing as ultimate security, detection of such tampers will help maintaining the integrity of information in a great way
2006-12-12
2,407 reads
In this video for beginners you'll begin to learn how to write queries that use more than one table using T-SQL. Kathi walks you through common tactics to efficiently pull out data from a normalized system.
2006-12-11
972 reads
By ChrisJenkins
Do you spend so long manipulating your data into something vaguely useful that you...
By Steve Jones
It was neat to stumble on this in the book, a piece by me,...
Forgive me for the title. Mentally I’m 12. When I started my current day...
Comments posted to this topic are about the item Microsoft Security Changes and SQL...
Comments posted to this topic are about the item Expanding into Print
Comments posted to this topic are about the item Downtime Caused by the Postgres...
In SQL Server 2025, what is returned by this code:
SELECT EDIT_DISTANCE('Steve', 'Stan')
Assume preview features are enabled. See possible answers