Your Field Guide To Designing Security Into Networking Protocols
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
We'll go over some examples of attacks against protocols and rules following, which will help you when designing and implementing protocols of your own.
Download a 108-page eBook in which Phil Factor lifts the lid on the victories, defeats and absurdities of a career spent in the rough-and-tumble of the IT industry. The paperback will to available to buy from Lulu.com shortly ($25), but the eBook is free for registered Simple-Talk.com users
This article is meant to explore these architectural issues from the bottom up, and aims to guide you through this new world. In the long run, new programming models are likely to appear that will abstract away a lot of the challenges you will encounter.
We have hosted a number of articles on various aspects of being a DBA, but we have usually focused on production or development DBA. New data warehousing DBA Janet Wong brings us a look at another type of DBA, the data warehouse DBA and the skills they need.
In this article I will discuss some new ideas that can result in either modifying SQL statements or injecting SQL code even if the code has escaped the delimiting characters. I will start with some best practices for constructing delimited identifiers and SQL literals, and then I'll show you new ways attackers can inject SQL code in order to help you protect your applications.
Check out SSIS, the SQL Server 2005 replacement for the older Data Transformation Services. You might find SSIS to be a great solution for automating SQL Server.
With Windows 2003 now clustered, you're ready to begin to clustering SQL Server 2005. In this presentation, you'll see how to cluster SQL Server 2005 and some best practices in how to configure the SQL Server cluster after the fact.
The suggested method illustrates a way how such tampering by an authorized user can be detected. While this method doesn't provide tamper-prevention measures, but as there is no such thing as ultimate security, detection of such tampers will help maintaining the integrity of information in a great way
In this video for beginners you'll begin to learn how to write queries that use more than one table using T-SQL. Kathi walks you through common tactics to efficiently pull out data from a normalized system.
By Brian Kelley
But as I've matured over the years, I came to realize that I needed...
By alevyinroc
I will be presenting my latest session, Documenting Your Work for Worry-Free Vacations, in-person...
By Steve Jones
I saw a question asking about the next sequence value and decided to try...
I've got a table with 186,703,969 rows, about 300GB of data. There are several...
I created a SQL Database in Azure Portal but I've just noticed it also...
Comments posted to this topic are about the item An Unusual Identity
What values are returned when I run this code?
CREATE TABLE dbo.IdentityTest2
(
id NUMERIC(10,0) IDENTITY(10,10) PRIMARY KEY,
somevalue VARCHAR(20)
)
GO
INSERT dbo.IdentityTest2
(
somevalue
)
VALUES
( 'Steve')
, ('Bill')
GO
SELECT top 10
id
FROM dbo.IdentityTest2 See possible answers