2006-03-28
1,562 reads
2006-03-28
1,562 reads
2006-03-27
1,263 reads
2006-03-24
1,188 reads
2006-03-23
169 reads
2006-03-20
1,218 reads
A defense-in-depth strategy, with overlapping layers of security, is the best way to counter these threats, and the least-privileged user account (LUA) approach is an important part of that defensive strategy. The LUA approach ensures that users follow the principle of least privilege and always log on with limited user accounts. This strategy also aims to limit the use of administrative credentials to administrators, and then only for administrative tasks.
2006-02-24
2,597 reads
2006-02-14
1,279 reads
2006-02-02
1,287 reads
This paper describes how SQL Server 2005 can be used to support row- and cell-level security (RLS/CLS). The examples provided in this white paper show how RLS and CLS can be used to meet classified database security requirements.
2006-02-02
2,813 reads
2006-02-01
1,529 reads
By Steve Jones
I don’t do a lot of work with disabled index, but I learned how...
By Steve Jones
I’m leaving again tomorrow for a trip. This time I head back to Boston...
By Tim Mitchell
Most of us who work with data have, at least a few times, been...
Comments posted to this topic are about the item 7 sept, scheduled book
Comments posted to this topic are about the item 7 sept, schedlued article
Comments posted to this topic are about the item 6 sept, published book
Azure Data Lake Storage Gen 2 is built on ...?
See possible answers