Mastering SQL Server 2000 security / Mike Young, Curtis W. Young.
Material type:
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
![]() |
Dr. S. R. Lasker Library, EWU E-book | Non-fiction | 005.758 YOM 2002 (Browse shelf(Opens below)) | Not for loan | ||||
![]() |
Dr. S. R. Lasker Library, EWU Reserve Section | Non-fiction | 005.758 YOM 2002 (Browse shelf(Opens below)) | C-1 | Not For Loan | 12720 | ||
![]() |
Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.758 YOM 2002 (Browse shelf(Opens below)) | C-2 | Available | 12721 |
TOC Ch. 1. Introducing SQL Server Security --
Ch. 2. Designing a Successful Security Model --
Ch. 3. Exploring Initial Security Parameters --
Ch. 4. Establishing Login Security --
Ch. 5. Managing Object Security --
Ch. 6. Designing Application Security --
Ch. 7. Implementing Front-End Application Security --
Ch. 8. Implementing Microsoft's Enterprise Development Strategy --
Ch. 9. Introducing the SQL Server Agent Service --
Ch. 10. Managing Distributed Data Security --
Ch. 11. Managing Data Transformation Services --
Ch. 12. Exploring Analysis Services Security --
Ch. 13. Managing Current Connections --
Ch. 14. Creating an Audit Policy --
Ch. 15. Managing Internet Security --
App. A. XML for SQL Server 2000
CSE
Tahur Ahmed
There are no comments on this title.