2003-09-24
2,217 reads
2003-09-24
2,217 reads
2003-09-19
1,753 reads
2003-09-11
1,758 reads
2003-08-28
1,985 reads
Application roles often interesting possibilities in theory. In practice? Brian explores how they work and some of the pros/cons you should consider before selecting them for use in your applications.
2008-07-25 (first published: 2003-08-27)
45,481 reads
2003-08-26
1,805 reads
Brian writes regularly for us on sql security issues, this week he discusses the pros and cons of various authentication methods.
2003-08-14
18,203 reads
Regular columnist Brian Kelley reviews the real world impact that inadequate security can have by reviewing some recent incidents in the sql/security world. Very much worth reading, especially if you have credit card data.
2003-07-31
7,554 reads
2003-07-23
2,782 reads
2003-07-18
2,631 reads
By Vinay Thakur
Transparent Data Encryption(TDE): TDE was initially introduced in SQL Server 2008 Enterprise Edition; this...
By Steve Jones
Only a little break for me. I’m actually heading to Las Vegas today for ...
By Steve Jones
I have a presentation on finding balance in your career that got quite a...
Comments posted to this topic are about the item The day-to-day pressures of a...
Comments posted to this topic are about the item This Week's AI Trust Problem...
Comments posted to this topic are about the item Migrate SSRS Reports to PowerBI...
When thinking of the Identity property for auto incrementing columns and sequences for the same action, which can be used with the BIGINT data type?
See possible answers