Securing SQL Server Applications
File List
- 03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.mp4 21.0 MB
- 03. Auditing/04. Reading and Interpreting Audit Logs.mp4 17.3 MB
- 04. Encryption in SQL Server/06. Using Always Encrypted.mp4 17.0 MB
- sql-server-securing-applications.zip 16.3 MB
- 03. Auditing/01. Purpose and Advantages of Auditing and Logging.mp4 15.8 MB
- 04. Encryption in SQL Server/03. Encrypting Data in SQL Server.mp4 13.3 MB
- 06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.mp4 12.8 MB
- 04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.mp4 11.9 MB
- 02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.mp4 11.6 MB
- 04. Encryption in SQL Server/05. Encrypting Data at Rest.mp4 10.6 MB
- 06. Tools for Compliance Regulations/05. Using SQL Server Ledger.mp4 10.5 MB
- 02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.mp4 9.7 MB
- 04. Encryption in SQL Server/04. Encrypting Column Data.mp4 9.7 MB
- 05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.mp4 9.0 MB
- 03. Auditing/03. Setting up SQL Server Auditing in a Database.mp4 8.3 MB
- 04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.mp4 8.1 MB
- 05. Fighting SQL Injection Attacks/02. Real World Injection Threats.mp4 7.6 MB
- 06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.mp4 7.4 MB
- 05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.mp4 7.3 MB
- 05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.mp4 6.2 MB
- 02. Introduction to Advanced Security Topics/03. Recognizing Security Threats and Vulnerabilities.mp4 5.0 MB
- 04. Encryption in SQL Server/01. Understanding Encryption for Data Security.mp4 4.0 MB
- 02. Introduction to Advanced Security Topics/02. Understanding the Significance of Securing Application Data.mp4 3.6 MB
- 02. Introduction to Advanced Security Topics/04. Security Best Practices for Applications Accessing SQL Server.mp4 3.3 MB
- 01. Course Overview/01. Course Overview.mp4 3.1 MB
- 06. Tools for Compliance Regulations/01. Introduction to Compliance Regulations.mp4 2.7 MB
- 06. Tools for Compliance Regulations/04. Introduction to Database Ledger.mp4 2.5 MB
- 03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.srt 13.3 KB
- 04. Encryption in SQL Server/06. Using Always Encrypted.srt 13.1 KB
- 02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.srt 10.8 KB
- 04. Encryption in SQL Server/03. Encrypting Data in SQL Server.srt 10.1 KB
- 04. Encryption in SQL Server/05. Encrypting Data at Rest.srt 9.9 KB
- 03. Auditing/01. Purpose and Advantages of Auditing and Logging.srt 9.7 KB
- 06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.srt 9.5 KB
- 04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.srt 8.5 KB
- 03. Auditing/04. Reading and Interpreting Audit Logs.srt 8.5 KB
- 02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.srt 8.3 KB
- 05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.srt 7.8 KB
- 04. Encryption in SQL Server/04. Encrypting Column Data.srt 7.6 KB
- 06. Tools for Compliance Regulations/05. Using SQL Server Ledger.srt 7.6 KB
- 04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.srt 6.6 KB
- 05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.srt 6.5 KB
- 02. Introduction to Advanced Security Topics/03. Recognizing Security Threats and Vulnerabilities.srt 5.6 KB
- 06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.srt 5.3 KB
- 05. Fighting SQL Injection Attacks/02. Real World Injection Threats.srt 5.2 KB
- 04. Encryption in SQL Server/01. Understanding Encryption for Data Security.srt 5.1 KB
- 02. Introduction to Advanced Security Topics/02. Understanding the Significance of Securing Application Data.srt 4.5 KB
- 03. Auditing/03. Setting up SQL Server Auditing in a Database.srt 4.4 KB
- 05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.srt 4.2 KB
- 02. Introduction to Advanced Security Topics/04. Security Best Practices for Applications Accessing SQL Server.srt 3.4 KB
- 06. Tools for Compliance Regulations/04. Introduction to Database Ledger.srt 3.3 KB
- 06. Tools for Compliance Regulations/01. Introduction to Compliance Regulations.srt 2.7 KB
- 01. Course Overview/01. Course Overview.srt 2.3 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.