SQL Server - Security for Developers
- 收录时间:2019-11-28 19:51:39
- 文件大小:183MB
- 下载次数:49
- 最近下载:2021-01-19 04:37:05
- 磁力链接:
-
文件列表
- 2.1. Roles and Privileges in SQL Server/05.Demo - Create a user in SQL Server.mp4 13MB
- 3.2. SQL Injection/19.Demo - Dynamic SQL parameterization.mp4 11MB
- 4.3. Securing Your Network/26.Demo - Linked servers.mp4 10MB
- 2.1. Roles and Privileges in SQL Server/09.Demo - Building custom roles.mp4 9MB
- 4.3. Securing Your Network/28.Demo - Azure SQL Database firewalls.mp4 8MB
- 4.3. Securing Your Network/27.Azure SQL Database firewalls.mp4 8MB
- 4.3. Securing Your Network/25.Linked server security.mp4 8MB
- 2.1. Roles and Privileges in SQL Server/13.Demo - Contained users.mp4 7MB
- 4.3. Securing Your Network/21.Network security.mp4 7MB
- 3.2. SQL Injection/20.External protection around SQL injection.mp4 7MB
- 2.1. Roles and Privileges in SQL Server/07.Least privileges principal.mp4 6MB
- 2.1. Roles and Privileges in SQL Server/08.Building custom roles in SQL Server.mp4 6MB
- 4.3. Securing Your Network/23.TLS 1.0 vs. TLS 1.2.mp4 6MB
- 3.2. SQL Injection/16.Writing proper SQL procedures.mp4 6MB
- 2.1. Roles and Privileges in SQL Server/10.Predefined roles in SQL Server.mp4 6MB
- 2.1. Roles and Privileges in SQL Server/06.Roles and privileges overview.mp4 6MB
- 2.1. Roles and Privileges in SQL Server/04.Azure AD and SQL authentication.mp4 6MB
- 3.2. SQL Injection/17.Demo - Stored procedures vs. dynamic SQL.mp4 6MB
- 2.1. Roles and Privileges in SQL Server/03.Logins and users.mp4 6MB
- 3.2. SQL Injection/15.SQL injection vulnerabilities.mp4 5MB
- 2.1. Roles and Privileges in SQL Server/12.Contained users and their benefits.mp4 5MB
- 2.1. Roles and Privileges in SQL Server/11.Roles in Azure SQL Database.mp4 5MB
- 4.3. Securing Your Network/22.Encrypting connections to SQL Server.mp4 5MB
- 3.2. SQL Injection/14.Overview of SQL injection.mp4 4MB
- 1.Introduction/02.Course software.mp4 4MB
- 4.3. Securing Your Network/24.Upgrading TLS with SQL Server.mp4 4MB
- 3.2. SQL Injection/18.Dynamic SQL and input checking.mp4 3MB
- 1.Introduction/01.Build secure applications in SQL Server.mp4 3MB
- 5.Conclusion/29.Next steps.mp4 927KB
- 2.1. Roles and Privileges in SQL Server/05.Demo - Create a user in SQL Server.en.srt 9KB
- 2.1. Roles and Privileges in SQL Server/07.Least privileges principal.en.srt 9KB
- 4.3. Securing Your Network/27.Azure SQL Database firewalls.en.srt 8KB
- 2.1. Roles and Privileges in SQL Server/08.Building custom roles in SQL Server.en.srt 8KB
- 4.3. Securing Your Network/21.Network security.en.srt 8KB
- 2.1. Roles and Privileges in SQL Server/04.Azure AD and SQL authentication.en.srt 8KB
- 3.2. SQL Injection/15.SQL injection vulnerabilities.en.srt 7KB
- 2.1. Roles and Privileges in SQL Server/03.Logins and users.en.srt 7KB
- 2.1. Roles and Privileges in SQL Server/06.Roles and privileges overview.en.srt 7KB
- 3.2. SQL Injection/20.External protection around SQL injection.en.srt 7KB
- 4.3. Securing Your Network/25.Linked server security.en.srt 7KB
- 3.2. SQL Injection/16.Writing proper SQL procedures.en.srt 7KB
- 2.1. Roles and Privileges in SQL Server/12.Contained users and their benefits.en.srt 7KB
- 3.2. SQL Injection/19.Demo - Dynamic SQL parameterization.en.srt 6KB
- 4.3. Securing Your Network/26.Demo - Linked servers.en.srt 6KB
- 4.3. Securing Your Network/28.Demo - Azure SQL Database firewalls.en.srt 6KB
- 2.1. Roles and Privileges in SQL Server/10.Predefined roles in SQL Server.en.srt 6KB
- 2.1. Roles and Privileges in SQL Server/11.Roles in Azure SQL Database.en.srt 6KB
- 4.3. Securing Your Network/23.TLS 1.0 vs. TLS 1.2.en.srt 6KB
- 4.3. Securing Your Network/22.Encrypting connections to SQL Server.en.srt 6KB
- 3.2. SQL Injection/14.Overview of SQL injection.en.srt 5KB
- 2.1. Roles and Privileges in SQL Server/09.Demo - Building custom roles.en.srt 5KB
- Exercise Files/Ex_Files_SQL_Security_Dev.zip 5KB
- 2.1. Roles and Privileges in SQL Server/13.Demo - Contained users.en.srt 5KB
- 4.3. Securing Your Network/24.Upgrading TLS with SQL Server.en.srt 4KB
- 3.2. SQL Injection/17.Demo - Stored procedures vs. dynamic SQL.en.srt 4KB
- 3.2. SQL Injection/18.Dynamic SQL and input checking.en.srt 3KB
- 1.Introduction/02.Course software.en.srt 3KB
- 1.Introduction/01.Build secure applications in SQL Server.en.srt 1KB
- 5.Conclusion/29.Next steps.en.srt 422B