Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
SQL Server Security Distilled, Second Edition

SQL Server Security Distilled, Second Edition

List Price: $49.99
Your Price: $32.99
Product Info Reviews

<< 1 >>

Rating: 4 stars
Summary: Distilled - To separate or extract the essential elements of
Review: A good definition for exactly what this book does. It breaks down every segment of the SQL Server security infrastructure in intricate detail so security professionals and DBAs alike can make the right decisions. The books is a good fit for anyone who must support multiple SQL Server versions (including SQL 6.5/7/2000 and CE) in almost every conceivable scenario including replicated deployments.

Noticably absent were any discussions of the security implications of MSDE or a detailed guide to setting up SSL on SQL Server. That said, the information in this book is absolutely vital to anyone who needs to get up to date on SQL Server security and doesn't have time to sort through Books Online, White Papers, and assorted websites on the subject.

Rating: 5 stars
Summary: A Note from the Author
Review: I spent just under 2 years doing the research for this book. In terms of breadth of coverage, there is no better book on the market. Rather than searching Microsoft's mammoth site for articles and white papers, everything you need to understand SQL Server security from version 6.5 to 2000 is in one book.

This book also goes deeper than the basic introduction to the various security mechanisms. Many books will tell you what SQL Server offers, but very few provide detailed information on *how* and *why* it works the way it does. Each chapter provides insights into the inner workings of SQL Server's security architecture and provides practical advice on how to use that information to keep your systems safe.

There are some other books that focus on showing you "hackers' tricks" for attacking your database servers, but this book takes the premise that if you do things the right way from the beginning, no hacker is ever going to find a trick that works on your systems. As an example, this book recommended configuring firewalls to block the traffic used by the Spammer virus long before the virus became news. Those who read this book and followed its advice slept soundly the weekend that Spammer was taking the Internet down.

Since the future of Curlingstone is in doubt, support for the book has moved to www.,.,..com, and the author is not only committed to maintaining the current work but also planning to release an interim update in electronic format in the fall covering changes in SQL Server 2000 Service Pack 3 and any new discoveries found since December, 2002. The author also plans to release additional chapters on Yukon early next year for early adopters. This book is alive and will be updated periodically to keep its readers safe from the bad guys.

Rating: 5 stars
Summary: Excellent Security Reference
Review: I've been working with SQL Server for 11 years and run SQL Server Central.

And I learned a bunch from this book. This is one of the best references on SQL Server Security that I have seen written and I recommend it highly to every SQL Server DBA.

The book is written to cover versions 6.5, 7.0, and 2000. And it does a great job with each. It starts by looking at the way that logins are authenticated by the server. Great detail is given, even to the point of examining network sniffer traces to show how the communication occurs between the client and server.

From there, the database security is examined with separate chapters for v6.5 and 7/2000 since they work differently. Not only is the process explained, but the author notes where there are bugs and unforseen consequences of assigning security in certain ways.

The early chapters provide insight into how security works in SQL Server. The later chapters build on this to give hints and suggestions for implementing security in your applications, DTS, replication, and even SQL Server CE.

Overall, this is a must read for SQL Server DBAs. Developers will benefit as well since a thorough understanding can solve a great many problems and prevent even more.

Rating: 5 stars
Summary: A holistic approach to security
Review: If you are responsible for a SQL Server database, can you afford not to think about security? Of course not. And this book definitely puts you on the right track. It offers a great great and encompassing view of the issues we as IT professionals face when it comes to SQL Server Security. It's not the same old best practices, rather it explains the why's behind the how's.

Rating: 5 stars
Summary: SQL Administrator - Beware!
Review: SQL Server Administrators need to beware because this book gives up the goods to any who read it. Morris Lewis does a great job of not only explaining how SQL Server implements Security and the weaknesses from mis-configuring the server, but also how to close those holes. With in-depth coverage of the topic and hands on examples you learn how to secure your database and server from likely hack attacks.

The book is well written, explains the subject matter well, and is very high on my list of suggested reading.

Rating: 4 stars
Summary: Good book, but nothing extraordinary
Review: This is a good book on security and covers most of the SQL security issues. It even goes in depth in describing the SQL security at the network layer. But if you already know that you should use Windows authentication, not use SA or other SQL accounts, stay away from port 1433, and regularly update SQL security patches, then you probably won't benefit substantially by reading this book. Nevertheless, it provides a comprehensive review of the SQL security.


<< 1 >>

© 2004, ReviewFocus or its affiliates