- Paperback: 462 pages
- Publisher: Syngress; 3 edition (May 7, 2015)
- Language: English
- ISBN-10: 0128012757
- ISBN-13: 978-0128012758
- Product Dimensions: 7.5 x 1 x 9.2 inches
- Shipping Weight: 2.2 pounds (View shipping rates and policies)
- Average Customer Review: 3 customer reviews
- Amazon Best Sellers Rank: #763,372 in Books (See Top 100 in Books)
Securing SQL Server: Protecting Your Database from Attackers 3rd Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
Frequently bought together
Customers who bought this item also bought
"Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He's a bare-knuckles, no-holds-barred technologist, and you can bet that if he tells you that something works or doesn't work, he's speaking from experience. Active in the community, his passion is sharing. You'll enjoy this book."-
-Buck Woody, Senior Technology Specialist, Microsoft
About the Author
Denny Cherry (MCSA, MCDBA, MCTS, MCITP, MCM) has been working with Microsoft technology for over 15 years starting with Windows 3.51 and SQL Server 6.5. In 2009, Denny was named as a Microsoft MVP for the Microsoft SQL Server product, and in 2011 Denny earned the Microsoft Certified Master certification for SQL Server 2008. Denny has written dozens of articles for a variety of websites as well as print magazines on a variety of subjects including SQL Server, Clustering, Storage Configuration, and SharePoint.
Try the Kindle edition and experience these great reading features:
Showing 1-3 of 3 reviews
There was a problem filtering reviews right now. Please try again later.
Having said that, the breadth and depth of the information is impressive, without getting so geeky that it requires a PhD to comprehend.
It’s a small thing - at least on the surface - but the security checklists in Appendix A look very good, and I plan on crosschecking our existing checklists against them, to make sure we have covered everything.