Securing SQL Server
On this page you will find some of the code examples and URLs from within the book Securing SQL Server 2nd edition as well as links to some of the web pages which are referenced within the book. Not all of the examples are here, only the longer ones which are hard to type from reading in the book. More information is available about the book on it’s website www.securingsqlserver.com.
Denny’s Site – www.mrdenny.com
Denny’s Main Blog – blog.mrdenny.com
Denny’s Storage Blog – www.sqlmag.com/blog/troubleshooting-sql-server-storage-problems-51/
Chapter 1
Example 1.3
Example 1.4
Example 1.5
Chapter 2
.NET Source Code from Chapter 2
Chapter 3
Example 3.8
Chapter 4
SQL Slammer Advisory
Microsoft Security Bulletin MS02-061
Example 4.11
Example 4.12
Example 4.13
Chapter 5
Microsoft SQL CLR Support Policy
Chapter 6
Example 6.1
Example 6.2
Example 6.3
Example 6.4
Example 6.5
Example 6.6
Example 6.7
Example 6.8
Example 6.9
Chapter 8
Example 8.4
Example 8.5
Example 8.6
Example 8.7
Example 8.10
Example 8.11
Example 8.19
Example 8.20
Example 8.21
Chapter 9
Example 9.1
Example 9.2
Example 9.3
Example 9.4
Example 9.8
Chapter 11
Example 11.4
Example 11.6
Example 11.9
Example 11.10
Example 11.11
Example 11.12
Example 11.13
Example 11.16
Example 11.17
Example 11.18
Example 11.19
Example 11.20
Example 11.21
Example 11.22
Example 11.24
Example 11.25
Example 11.27
Common Criteria Downloads (SQL_Server2008_EAL1_trace.sql, integritycheck_SQL2008_EE.zip, permission_hierarchy.zip, MS_KEAL1_ST_1.2.pdf, MS_SQL_AGD_ADD_1.3.pdf)
Chapter 12
Example 12.1
Example 12.3
Data Collector Security
Chapter 13
Example 13.14
Example 13.15
Share this:
- StumbleUpon Google +1