TorBT - Torrents and Magnet Links Search Engine

Securing SQL Server Applications

File Name
Size
01. Course Overview/01. Course Overview.mp4
3.1 MB
01. Course Overview/01. Course Overview.srt
2.3 kB
02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.mp4
9.7 MB
02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.srt
11 kB
02. Introduction to Advanced Security Topics/02. Understanding the Significance of Securing Application Data.mp4
3.6 MB
02. Introduction to Advanced Security Topics/02. Understanding the Significance of Securing Application Data.srt
4.5 kB
02. Introduction to Advanced Security Topics/03. Recognizing Security Threats and Vulnerabilities.mp4
5.0 MB
02. Introduction to Advanced Security Topics/03. Recognizing Security Threats and Vulnerabilities.srt
5.6 kB
02. Introduction to Advanced Security Topics/04. Security Best Practices for Applications Accessing SQL Server.mp4
3.3 MB
02. Introduction to Advanced Security Topics/04. Security Best Practices for Applications Accessing SQL Server.srt
3.4 kB
02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.mp4
12 MB
02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.srt
8.3 kB
03. Auditing/01. Purpose and Advantages of Auditing and Logging.mp4
16 MB
03. Auditing/01. Purpose and Advantages of Auditing and Logging.srt
9.7 kB
03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.mp4
21 MB
03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.srt
13 kB
03. Auditing/03. Setting up SQL Server Auditing in a Database.mp4
8.3 MB
03. Auditing/03. Setting up SQL Server Auditing in a Database.srt
4.4 kB
03. Auditing/04. Reading and Interpreting Audit Logs.mp4
17 MB
03. Auditing/04. Reading and Interpreting Audit Logs.srt
8.5 kB
04. Encryption in SQL Server/01. Understanding Encryption for Data Security.mp4
4.0 MB
04. Encryption in SQL Server/01. Understanding Encryption for Data Security.srt
5.1 kB
04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.mp4
8.1 MB
04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.srt
6.6 kB
04. Encryption in SQL Server/03. Encrypting Data in SQL Server.mp4
13 MB
04. Encryption in SQL Server/03. Encrypting Data in SQL Server.srt
10 kB
04. Encryption in SQL Server/04. Encrypting Column Data.mp4
9.7 MB
04. Encryption in SQL Server/04. Encrypting Column Data.srt
7.6 kB
04. Encryption in SQL Server/05. Encrypting Data at Rest.mp4
11 MB
04. Encryption in SQL Server/05. Encrypting Data at Rest.srt
9.9 kB
04. Encryption in SQL Server/06. Using Always Encrypted.mp4
17 MB
04. Encryption in SQL Server/06. Using Always Encrypted.srt
13 kB
04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.mp4
12 MB
04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.srt
8.5 kB
05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.mp4
7.3 MB
05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.srt
6.5 kB
05. Fighting SQL Injection Attacks/02. Real World Injection Threats.mp4
7.6 MB
05. Fighting SQL Injection Attacks/02. Real World Injection Threats.srt
5.2 kB
05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.mp4
6.2 MB
05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.srt
4.2 kB
05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.mp4
9.0 MB
05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.srt
7.8 kB
06. Tools for Compliance Regulations/01. Introduction to Compliance Regulations.mp4
2.7 MB
06. Tools for Compliance Regulations/01. Introduction to Compliance Regulations.srt
2.7 kB
06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.mp4
7.4 MB
06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.srt
5.3 kB
06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.mp4
13 MB
06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.srt
9.5 kB
06. Tools for Compliance Regulations/04. Introduction to Database Ledger.mp4
2.5 MB
06. Tools for Compliance Regulations/04. Introduction to Database Ledger.srt
3.3 kB
06. Tools for Compliance Regulations/05. Using SQL Server Ledger.mp4
10 MB
06. Tools for Compliance Regulations/05. Using SQL Server Ledger.srt
7.6 kB
sql-server-securing-applications.zip
16 MB