SQL Server Security Fundamentals
- 收录时间:2025-01-27 20:45:29
- 文件大小:174MB
- 下载次数:1
- 最近下载:2025-01-27 20:45:29
- 磁力链接:
-
文件列表
- sql-server-security-fundamentals.zip 24MB
- 03. Understanding Authentication and Authorization/06. Demo- Granting and Revoking Permissions.mp4 14MB
- 04. Understanding Principals, Objects, and Role-based Security/09. Demo- Granting and Revoking Permissions on Objects.mp4 12MB
- 03. Understanding Authentication and Authorization/03. Demo- Creating Logins and Users for Authentication.mp4 11MB
- 04. Understanding Principals, Objects, and Role-based Security/04. Demo- Creating and Managing Principals with Roles.mp4 9MB
- 04. Understanding Principals, Objects, and Role-based Security/07. Demo- Certificates and Asymmetric Keys in SQL Server.mp4 9MB
- 02. Getting Started with SQL Server Security/02. Importance of SQL Server Security.mp4 8MB
- 02. Getting Started with SQL Server Security/04. Demo- Securing Database Files by Folder Permissions.mp4 8MB
- 02. Getting Started with SQL Server Security/05. Demo- Securing Database Access by Login Audit.mp4 7MB
- 04. Understanding Principals, Objects, and Role-based Security/05. Demo- Adding and Removing Principals from Groups.mp4 7MB
- 03. Understanding Authentication and Authorization/02. Understanding Authentication.mp4 6MB
- 03. Understanding Authentication and Authorization/05. Authorization and Permissions.mp4 5MB
- 04. Understanding Principals, Objects, and Role-based Security/11. Demo- Schema Bound Objects and Security.mp4 5MB
- 04. Understanding Principals, Objects, and Role-based Security/02. Principals in SQL Server.mp4 5MB
- 02. Getting Started with SQL Server Security/03. Authentication, Authorization, and Encryption.mp4 4MB
- 02. Getting Started with SQL Server Security/06. Best Practices.mp4 4MB
- 04. Understanding Principals, Objects, and Role-based Security/06. Certificates and Asymmetric Keys.mp4 4MB
- 03. Understanding Authentication and Authorization/04. Demo- Mapping Logins to Database Users.mp4 4MB
- 02. Getting Started with SQL Server Security/01. Introduction.mp4 4MB
- 04. Understanding Principals, Objects, and Role-based Security/12. Summary.mp4 4MB
- 04. Understanding Principals, Objects, and Role-based Security/08. Objects and Security Considerations.mp4 4MB
- 03. Understanding Authentication and Authorization/07. Summary.mp4 3MB
- 04. Understanding Principals, Objects, and Role-based Security/03. Understanding Roles and Groups.mp4 3MB
- 01. Course Overview/01. Course Overview.mp4 3MB
- 04. Understanding Principals, Objects, and Role-based Security/10. Schema Bound Objects and Security.mp4 2MB
- 03. Understanding Authentication and Authorization/01. Introduction.mp4 2MB
- 04. Understanding Principals, Objects, and Role-based Security/01. Introduction.mp4 2MB
- 03. Understanding Authentication and Authorization/06. Demo- Granting and Revoking Permissions.srt 10KB
- 03. Understanding Authentication and Authorization/03. Demo- Creating Logins and Users for Authentication.srt 9KB
- 02. Getting Started with SQL Server Security/02. Importance of SQL Server Security.srt 8KB
- 04. Understanding Principals, Objects, and Role-based Security/04. Demo- Creating and Managing Principals with Roles.srt 7KB
- 04. Understanding Principals, Objects, and Role-based Security/07. Demo- Certificates and Asymmetric Keys in SQL Server.srt 7KB
- 04. Understanding Principals, Objects, and Role-based Security/09. Demo- Granting and Revoking Permissions on Objects.srt 6KB
- 03. Understanding Authentication and Authorization/05. Authorization and Permissions.srt 6KB
- 03. Understanding Authentication and Authorization/02. Understanding Authentication.srt 6KB
- 02. Getting Started with SQL Server Security/04. Demo- Securing Database Files by Folder Permissions.srt 5KB
- 04. Understanding Principals, Objects, and Role-based Security/05. Demo- Adding and Removing Principals from Groups.srt 5KB
- 02. Getting Started with SQL Server Security/05. Demo- Securing Database Access by Login Audit.srt 5KB
- 04. Understanding Principals, Objects, and Role-based Security/02. Principals in SQL Server.srt 5KB
- 02. Getting Started with SQL Server Security/03. Authentication, Authorization, and Encryption.srt 4KB
- 04. Understanding Principals, Objects, and Role-based Security/06. Certificates and Asymmetric Keys.srt 4KB
- 04. Understanding Principals, Objects, and Role-based Security/11. Demo- Schema Bound Objects and Security.srt 4KB
- 02. Getting Started with SQL Server Security/01. Introduction.srt 4KB
- 02. Getting Started with SQL Server Security/06. Best Practices.srt 3KB
- 04. Understanding Principals, Objects, and Role-based Security/12. Summary.srt 3KB
- 04. Understanding Principals, Objects, and Role-based Security/08. Objects and Security Considerations.srt 3KB
- 03. Understanding Authentication and Authorization/07. Summary.srt 3KB
- 04. Understanding Principals, Objects, and Role-based Security/10. Schema Bound Objects and Security.srt 2KB
- 03. Understanding Authentication and Authorization/04. Demo- Mapping Logins to Database Users.srt 2KB
- 04. Understanding Principals, Objects, and Role-based Security/03. Understanding Roles and Groups.srt 2KB
- 03. Understanding Authentication and Authorization/01. Introduction.srt 2KB
- 01. Course Overview/01. Course Overview.srt 2KB
- 04. Understanding Principals, Objects, and Role-based Security/01. Introduction.srt 2KB