- Paperback: 462 pages
- Publisher: Syngress; 3 edition (May 7, 2015)
- Language: English
- ISBN-10: 0128012757
- ISBN-13: 978-0128012758
- Product Dimensions: 7.5 x 1 x 9.2 inches
- Shipping Weight: 2.2 pounds (View shipping rates and policies)
- Average Customer Review: 3 customer reviews
- Amazon Best Sellers Rank: #740,592 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Securing SQL Server, Third Edition: Protecting Your Database from Attackers 3rd Edition
Use the Amazon App to scan ISBNs and compare prices.
The Amazon Book Review
Author interviews, book reviews, editors picks, and more. Read it now
Frequently bought together
What other items do customers buy after viewing this item?
"Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He's a bare-knuckles, no-holds-barred technologist, and you can bet that if he tells you that something works or doesn't work, he's speaking from experience. Active in the community, his passion is sharing. You'll enjoy this book."-
-Buck Woody, Senior Technology Specialist, Microsoft
About the Author
Denny Cherry (MCSA, MCDBA, MCTS, MCITP, MCM) has been working with Microsoft technology for over 15 years starting with Windows 3.51 and SQL Server 6.5. In 2009, Denny was named as a Microsoft MVP for the Microsoft SQL Server product, and in 2011 Denny earned the Microsoft Certified Master certification for SQL Server 2008. Denny has written dozens of articles for a variety of websites as well as print magazines on a variety of subjects including SQL Server, Clustering, Storage Configuration, and SharePoint.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Having said that, the breadth and depth of the information is impressive, without getting so geeky that it requires a PhD to comprehend.
It’s a small thing - at least on the surface - but the security checklists in Appendix A look very good, and I plan on crosschecking our existing checklists against them, to make sure we have covered everything.