Chapter 7. Managing Security

IN THIS CHAPTER, YOU WILL LEARN TO DO THE FOLLOWING:

  • IMPLEMENT USER SECURITY (Pages 222 – 234)

    • Understand the Security Architecture (Page 222)

    • Implement Server Logins (Page 229)

    • Implement Database Users (Page 232)

  • IMPLEMENT ROLES (Pages 234 – 240)

    • Manage Server Roles (Page 234)

    • Implement Database Roles (Page 236)

    • Implement Application Roles (Page 237)

  • IMPLEMENT PERMISSIONS (Pages 240 – 245)

    • Understand the Permissions Model (Page 240)

    • Manage Permissions through SSMS (Page 241)

    • Manage Permissions through a Transact SQL Script (Page 244)

  • ENCRYPT DATA WITH KEYS (Pages 245 – 257)

    • Understand SQL Server Keys (Page 246)

    • Manage SQL Server Keys (Page 247)

    • Encrypt and Decrypt Data with Keys (Page 253)

    • Implement Transparent Data Encryption ...

Get SQL Server® 2008 Administration: Instant Reference now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.