Stop SQL Injection Attacks Before They Stop You
This article discusses:
* How SQL injection attacks work
* Testing for vulnerabilities
* Validating user input
* Using .NET features to prevent attacks
* Importance of handling exceptions
This article discusses:
* How SQL injection attacks work
* Testing for vulnerabilities
* Validating user input
* Using .NET features to prevent attacks
* Importance of handling exceptions
One of the neatest T-SQL enhancements in SQL Server 2005 is the ROW_NUMBER() function. New author Charles Hawkins brings us an explanation of how you can use this function along with a Common Table Expression to remove duplicate data.
This whitepaper is intended to shed light on the issues affecting application performance in the wide area, and to give IT managers the knowledge required to design strategic enterprise application acceleration and deployment solutions
String manipulation is not one of the strong points of T-SQL, but there are some functions that can greatly assist you with searching and working with character values. New author Robert Davis brings us a look at PATINDEX, one of the search functions and also explains the differences between it and the often used CHARINDEX.
Should you use dynamic or static SQL in your SQL Server application? This is a hotly debated topic and Arthur Fuller brings his thoughts to this debate.
there are occasions in all of our working lives when sitting through a PowerPoint presentation is inevitable. Fortunately, there are techniques for feigning interest, many of which have developed over hundreds of years. All you need is a handful of like-minded colleagues with a sporting attitude
SQL Server 2005 brings us a number of enhancements, but the most important to T-SQL developers may be the changes to error and exception handling. The addition of the TRY CATCH structure is an important change and Raj Vasant brings us a look at this enhancement.
This paper describes how SQL Server 2005 can be used to support row- and cell-level security (RLS/CLS). The examples provided in this white paper show how RLS and CLS can be used to meet classified database security requirements.
Replication is a great tool, but it has a number of restrictions on what you can do with replicated databases. Typically you cannot easily move a replicated database, but our own Andy Warren brings us a technique that can get around this.
This article presents an excerpt from the book, Applied Microsoft Analysis Services, by Teo Lachev. Learn how to author “smart” reports using Reporting Services (SSRS), Analysis Services (SSAS), and SQL Server CLR stored procedures. Get the reports demonstrated in this article by downloading the sample code.
I previously wrote about how the underlying technology for Fabric mirroring changed with SQL...
By Steve Jones
At the recent Redgate Summit in Chicago, I demo’d (lightly) the ML based Alert...
By Steve Jones
los vidados – n. the half-remembered acquaintances you knew years ago, who you might...
Comments posted to this topic are about the item Seeding a Fabric Warehouse with...
Comments posted to this topic are about the item Seeding a Fabric Warehouse with...
Comments posted to this topic are about the item Doing the Little Things
If I want to track historical data values, which mechanism should I use?
See possible answers