SQL Server Security Learning Guide
SQL Server is a popular target to Internet hackers. Make sure SQL Server is locked down from the get-go and continually hardened to prevent attacks.
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.


![]() |
![]() |
- Webcast: SQL Server Security School: Securing SQL Servers using Group Policy
- White paper: Microsoft SQL Server 2000 security
- White paper: Microsoft SQL Server 2000 SP3 security features and best practices
- White paper: An enterprise-class plan for securing Microsoft SQL Server databases
- Tip: Netlibs: Why is less more (secure)
- Expert advice: Resource for hardening SQL Server 2000
- Step-by-Step Guide: Ensuring data integrity in SQL Server
![]() |
![]() |
- Webcast: SQL Server Security School: Minimizing SQL Server service, login and user accounts
- Tip: How SQL Server is hacked
- Tip: User rights and privileges
- Tip: Accessing, manipulating and backing up data
- Tip: Top four ways to secure SQL Server
- Checklist: SQL Server user security
- Expert advice: Secure way to share access to SQL Server running multiple databases
- Expert advice: Secure data from the DBA
- Expert advice: Permanently prevent Query Analyzer from accessing a particular database
![]() |
![]() |
- Tip: Encrypting data in SQL Server: Dos and don'ts
- Tip: How to improve SQL Server security
- Tip: jTDS: Open-source JDBC 3.0 middleware driver for SQL Server
- Expert advice: Permanently prevent Query Analyzer from accessing a particular database
- Expert advice: Hiding the source for a stored procedure
- Expert advice: Encrypting password fields
![]() |
![]() |
- Webcast: SQL Server Security School: SQL Server discovery challenges and solutions
- Tip: How to improve SQL Server security
- Step-by-Step Guide: How to patch SQL Server, part 1
- Step-by-Step Guide: How to patch SQL Server, part 2
![]() |
![]() |
- Article: Security is a catch word for SQL Server's sequel
- Book excerpt: New security features in SQL Server 2005
- Book excerpt: Optional features are turned off by default
- Book excerpt: A quick review of SQL Server security concepts with enhancements
- Book excerpt: SQL Server password policies and credentials
- Book excerpt: Separation of users and schemas
- Book excerpt: Specifying execution context for procedural code
- Book excerpt: SQL Server permissions and new objects
- Book excerpt: Assembly permissions -- Who can catalog and use an assembly?
- Book excerpt: Permissions, visibility, UDTs and user-defined aggregates
- Book excerpt: What can .NET code do from within SQL Server: Safety levels
- Poll: Which new SQL Server 2005 security enhancement is most significant?


Dig Deeper on SQL Server Security
PRO+
Content
Find more PRO+ content and other member only offers, here.
0 comments
Oldest Newest