Community

Secure SQL Server: Encryption and SQL injection attacks

(Susan Sales Harkins and Mike Gunderloy) Welcome to the final installment of our series on SQL Server security. So far, we’ve explained how to set up your SQL Server, how to manage users and groups, how to manage objects and permissions, and how to set up application roles. Today we’re going t

Read More - Register for Free Membership