In this chapter, you will learn about:
• Server security basics
• Authentication modes
• Security principals such as server logins and database users
• Server roles and database roles
• Securables such as tables, VIEWs, and stored procedures
Never underestimate the time, expense, and effort an opponent will expend to break a code.
It's been said that the only way to keep your computer 100 percent safe and secure is to power it down, unplug it from the network, and bury it in the sand. Safe and secure? Yes. Usable? No. When it comes to security, we must constantly strive for a balance between security and usability by practicing risk management.
In this chapter, we'll cover some basic ...