Designing Security for Applications
Chapters 1 through 4 concentrated on securing SQL Server itself both in terms of who can log into the server and in terms of what a user can do with the data in the databases. It is very unusual, however, for users to work directly with a database server; the typical scenario involves a client working with an application that, in turn, issues queries to the database server. This concept of a client-server relationship is a very old one that dates back to the early days of computers, and even application designs that have several layers between the client and the data-base server are just combinations of multiple client-server relationships.
KeywordsDatabase Server Public Role Brute Force Attack Design Security Asymmetric Encryption
Unable to display preview. Download preview PDF.