|
This course shows users how to plan the security policies for a SQL Server 7 installation.
Objectives:
- Assess whether to use Microsoft Windows NT or Microsoft SQL Server accounts
- Decide whether to use the Windows NT group structure for a SQL Server 7.0 installation
- Plan the use and structure of SQL Server roles
- Assess whether to map Windows NT groups directly into a database or use SQL Server logins
- Choose which NT accounts will be used to run SQL Server services
- Plan an n-tier application security strategy and determine whether to use application roles or other mid-tier security mechanisms such as Microsoft Transaction Server
- Plan the security requirements for linked databases
Topics:
- SQL Server Authentication Methods
- Using Windows NT Groups
- Planning the Use of SQL Server Roles
- Developing a Security Strategy
- Other Security Issues
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|