Microsoft® SQL Server® 2012 Bible
847 Chapter 33: Authorizing Securables 33 GRANT UPDATE ON Sales.SalesHeader TO Data_Analyst; GO Multiple users or roles, and mul ...
848 Part VI: Securing Your SQL Server Managing Roles with Code Creating user-defi ned roles with code involves using the sp_addr ...
849 Chapter 33: Authorizing Securables 33 ■ (^) The manager role may have all worker rights plus additional rights to look up ta ...
850 Part VI: Securing Your SQL Server Unfortunately, the list of objects appears to be unsorted, or only partially sorted, and t ...
851 Chapter 33: Authorizing Securables 33 TABLE 33-3 Sample User and Windows Group Role Assignments User / Windows Group Databas ...
852 Part VI: Securing Your SQL Server Summary It’s essential to secure the database objects to prevent unauthorized access that ...
853 CHAPTER 34 Data Encryption IN THIS CHAPTER Introducing Data Encryption Using the SQL Server Tools S ecuring access to the ta ...
854 Part VI: Securing Your SQL Server Transparent Data Encryption (TDE) is a special kind of encryption using a symmetric key. T ...
855 Chapter 34: Data Encryption 34 To actually encrypt data, SQL Server provides fi ve methods: ■ Transact-SQL functions ■ (^) S ...
856 Part VI: Securing Your SQL Server Result: MembershipCardID CustomerID MembersCardNumber MembershipExpires ---------------- - ...
857 Chapter 34: Data Encryption 34 After the keys are created, they are listed in Management Studio’s Object Explorer under the ...
858 Part VI: Securing Your SQL Server Using the Symmetric Key To use the symmetric key, the fi rst step is to open the key. This ...
859 Chapter 34: Data Encryption 34 SQL Server supports RSA_512, RSA_1024, and RSA_2048 as possible asymmetric algo- rithms. The ...
c34.indd 860c34.indd 860 7/31/2012 10:01:47 AM7/31/2012 10:01:47 AM http://www.it-ebooks.info ...
861 CHAPTER 35 Row-Level Security IN THIS CHAPTER Extending The Abstraction Layer For Custom Row- Level Security Implementing Th ...
862 Part VI: Securing Your SQL Server (Jose) ■ (^) Fetch procedure: Checks the security procedure for permission to return the d ...
863 Chapter 35: Row-Level Security 35 The following three commands add the constraints to the Security table: CREATE TRIGGER Per ...
864 Part VI: Securing Your SQL Server (Jose) s.SecurityLevel FROM dbo.Security AS s INNER JOIN Person.Person AS p ON s.PersonID ...
865 Chapter 35: Row-Level Security 35 ('Address: ''%s'' not found', 15,1,@AddressCode); RETURN -100; END; -- Insert INSERT dbo.S ...
866 Part VI: Securing Your SQL Server (Jose) EXEC pSecurity_Assign @PersonCode = '118', @AddressCode = '2', @SecurityLevel = 1; ...
«
40
41
42
43
44
45
46
47
48
49
»
Free download pdf