Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484255650
    Language: English
    Pages: 1 online resource (1 video file, approximately 58 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Master SQL Server’s Always Encrypted feature to provide column-level encryption of sensitive data such that only authorized application users can see that data. This video explains how the Always Encrypted feature works and shows how to implement column encryption using best practices. System and database administrators who might otherwise have access to view any data in the database are not able to view data protected through Always Encrypted’s feature set. This video begins with an introduction to column encryption as implemented through the Always Encrypted feature, and the use cases for applying that encryption. Then follows an explanation of how exactly the technology works and is implemented in SQL Server. The video then walks you through implementing Always Encrypted column encryption on a new database and again on an existing database. Finally, the video covers how to configure an application to access the encrypted data in a manner that is transparent and convenient for end users of your database applications. What You Will Learn Recognize use cases for the Always Encrypted feature Understand how the feature works technically Generate an encrypted column for a new table Insert data into an encrypted database column Encrypt existing data within a table Identify the relevant encryption certificates Modify an application to access encrypted data Who This Book Is For Database administrators, application developers, and system architects who need to encrypt and protect data in a SQL Server instance. Especially helpful when it must be ensured that database administrators and system administrators do not in any way have access to encrypted data.
    Note: Online resource; Title from title screen (viewed October 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484251515
    Language: English
    Pages: 1 online resource (1 video file, approximately 38 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Learn best practices in certificate management for SQL Server. Certificates are small snippets of text that are foundational to encrypting and decrypting data. Watch this video to learn how to safely store certificates and prevent them from falling into the wrong hands and compromising the very data you are using them to protect. Also learn how to ensure that you still have access to needed certificates following a catastrophe or other data loss event, because data loss from lost certificates is a very real risk that must be managed and mitigated. This video begins with a short introduction to certificates and some of the different types of encryption they enable you as a SQL Server DBA to implement – such as transparent data encryption (TDE), backup encryption, and column encryption. Then you’ll learn practices for generating and managing certificates specifically for each of the different certificate types. Next, you’ll learn best practices for backing up and securing your encryption certificates so that you have them when you need them, because losing them can mean losing your data altogether. You’ll learn about certificate expiration, and the proper methods by which to backup, store, restore, and protect your certificates so that any encrypted data is never lost. What You Will Learn Ensure access to certificates following a catastrophe or other data loss event Learn about the types of encryption SQL Server offers Understand how certificates enable encryption Generate correct certificates for your chosen encryption methods Find where each certificate type is stored, how to back it up, and how to restore it Identify best practices with regards to generating and managing certificates Who This Video Is For For database administrators and system administrators who handle or plans to handle certificates for encrypting data on SQL Server instances.
    Note: Online resource; Title from title screen (viewed June 27, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Apress | Boston, MA : Safari
    ISBN: 9781484259221
    Language: English
    Pages: 1 online resource (1 video file, approximately 35 min.)
    Edition: 1st edition
    Keywords: Electronic videos ; local
    Abstract: Protect yourself against data theft through unauthorized access to the physical database files and their copies that may be found in backup sets and transaction logs. Thwart unauthorized access to those files by making use of SQL Server's Transparent Data Encryption (TDE) feature to provide at-rest encryption of an entire database such that only authorized instances of SQL Server can read the data, log, and backup files. This video explains how the TDE feature works and shows how to implement at-rest encryption using best practices. It also covers independent backup encryption for an additional layer of protection. The video begins with an introduction to TDE and the pros and cons of its implementation. It talks about the use case for applying this type of encryption. The video then walks you through implementing TDE on a new database or existing database. Next, it will cover how to manage the movement of these encrypted databases. Finally, you'll cover independent backup encryption. What You Will Learn Recognize use cases for Transparent Data Encryption Encrypt your entire database, including log and backup files Preserve encryption keys and restore from encrypted backups Manage encryption through dynamic management objects Encrypt database backups independently of TDE Move a TDE encrypted database, including log files Who This Video Is For Database administrators who need to encrypt a database at rest to meet IT audit requirements, or for reasons of data privacy and confidentiality. For system architects who want to understand their options for securing their organization's confidential data.
    Note: Online resource; Title from title screen (viewed April 20, 2020) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...