Designing Security for Applications

  • Morris Lewis


Chapters 1 through 4 concentrated on securing SQL Server itself both in terms of who can log into the server and in terms of what a user can do with the data in the databases. It is very unusual, however, for users to work directly with a database server; the typical scenario involves a client working with an application that, in turn, issues queries to the database server. This concept of a client-server relationship is a very old one that dates back to the early days of computers, and even application designs that have several layers between the client and the data-base server are just combinations of multiple client-server relationships.


Database Server Public Role Brute Force Attack Design Security Asymmetric Encryption 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Morris Lewis 2004

Authors and Affiliations

  • Morris Lewis

There are no affiliations available

Personalised recommendations