Securing SQL Server

On this page you will find some of the code examples and URLs from within the book Securing SQL Server 2nd edition as well as links to some of the web pages which are referenced within the book. Not all of the examples are here, only the longer ones which are hard to type from reading in the book. More information is available about the book on it’s website www.securingsqlserver.com.

Denny’s Site – www.mrdenny.com

Denny’s Main Blog – blog.mrdenny.com

Denny’s Storage Blog – www.sqlmag.com/blog/troubleshooting-sql-server-storage-problems-51/

 

Chapter 1

Example 1.3
Example 1.4
Example 1.5

Chapter 2

.NET Source Code from Chapter 2

Chapter 3

Example 3.8

Chapter 4

SQL Slammer Advisory
Microsoft Security Bulletin MS02-061
Example 4.11
Example 4.12
Example 4.13

Chapter 5

Microsoft SQL CLR Support Policy

Chapter 6

Example 6.1
Example 6.2
Example 6.3
Example 6.4
Example 6.5
Example 6.6
Example 6.7
Example 6.8
Example 6.9

Chapter 8

Example 8.4
Example 8.5
Example 8.6
Example 8.7
Example 8.10
Example 8.11
Example 8.19
Example 8.20
Example 8.21

Chapter 9

Example 9.1
Example 9.2
Example 9.3
Example 9.4
Example 9.8

Chapter 11

Example 11.4
Example 11.6
Example 11.9
Example 11.10
Example 11.11
Example 11.12
Example 11.13
Example 11.16
Example 11.17
Example 11.18
Example 11.19
Example 11.20
Example 11.21
Example 11.22
Example 11.24
Example 11.25
Example 11.27
Common Criteria Downloads (SQL_Server2008_EAL1_trace.sql, integritycheck_SQL2008_EE.zip, permission_hierarchy.zip, MS_KEAL1_ST_1.2.pdf, MS_SQL_AGD_ADD_1.3.pdf)

Chapter 12

Example 12.1
Example 12.3
Data Collector Security

Chapter 13

Example 13.14
Example 13.15

Share this:

  • Email
  • Twitter
  • Facebook
  • LinkedIn
  • StumbleUpon
  • Google +1
Go to Top
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.