Advertisement

Designing Security for Applications

  • Morris Lewis

Abstract

Chapters 1 through 4 concentrated on securing SQL Server itself both in terms of who can log into the server and in terms of what a user can do with the data in the databases. It is very unusual, however, for users to work directly with a database server; the typical scenario involves a client working with an application that, in turn, issues queries to the database server. This concept of a client-server relationship is a very old one that dates back to the early days of computers, and even application designs that have several layers between the client and the data-base server are just combinations of multiple client-server relationships.

Keywords

Database Server Public Role Brute Force Attack Design Security Asymmetric Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Morris Lewis 2004

Authors and Affiliations

  • Morris Lewis

There are no affiliations available

Personalised recommendations