资源详情

返回首页 | 相关搜索
SQL Server Security Fundamentals
大小 173.56 MB
文件数 53
Info Hash: B04DF8B2DD50DDB956E7A621CDB134E3EA0AD032
收录时间 2026-01-13 01:22:39
更新时间 2026-01-13 02:05:23
文件列表 (53)
01. Course Overview/01. Course Overview.mp4
2.65 MB
01. Course Overview/01. Course Overview.srt
1.79 KB
02. Getting Started with SQL Server Security/01. Introduction.mp4
3.77 MB
02. Getting Started with SQL Server Security/01. Introduction.srt
3.51 KB
02. Getting Started with SQL Server Security/02. Importance of SQL Server Security.mp4
8.33 MB
02. Getting Started with SQL Server Security/02. Importance of SQL Server Security.srt
7.68 KB
02. Getting Started with SQL Server Security/03. Authentication, Authorization, and Encryption.mp4
4.49 MB
02. Getting Started with SQL Server Security/03. Authentication, Authorization, and Encryption.srt
4.17 KB
02. Getting Started with SQL Server Security/04. Demo- Securing Database Files by Folder Permissions.mp4
8.28 MB
02. Getting Started with SQL Server Security/04. Demo- Securing Database Files by Folder Permissions.srt
5.46 KB
02. Getting Started with SQL Server Security/05. Demo- Securing Database Access by Login Audit.mp4
7.49 MB
02. Getting Started with SQL Server Security/05. Demo- Securing Database Access by Login Audit.srt
5.15 KB
02. Getting Started with SQL Server Security/06. Best Practices.mp4
4.29 MB
02. Getting Started with SQL Server Security/06. Best Practices.srt
3.41 KB
03. Understanding Authentication and Authorization/01. Introduction.mp4
2.06 MB
03. Understanding Authentication and Authorization/01. Introduction.srt
2.05 KB
03. Understanding Authentication and Authorization/02. Understanding Authentication.mp4
5.63 MB
03. Understanding Authentication and Authorization/02. Understanding Authentication.srt
5.75 KB
03. Understanding Authentication and Authorization/03. Demo- Creating Logins and Users for Authentication.mp4
10.65 MB
03. Understanding Authentication and Authorization/03. Demo- Creating Logins and Users for Authentication.srt
9.2 KB
03. Understanding Authentication and Authorization/04. Demo- Mapping Logins to Database Users.mp4
4.16 MB
03. Understanding Authentication and Authorization/04. Demo- Mapping Logins to Database Users.srt
2.31 KB
03. Understanding Authentication and Authorization/05. Authorization and Permissions.mp4
5.24 MB
03. Understanding Authentication and Authorization/05. Authorization and Permissions.srt
5.96 KB
03. Understanding Authentication and Authorization/06. Demo- Granting and Revoking Permissions.mp4
14.5 MB
03. Understanding Authentication and Authorization/06. Demo- Granting and Revoking Permissions.srt
10.09 KB
03. Understanding Authentication and Authorization/07. Summary.mp4
3.24 MB
03. Understanding Authentication and Authorization/07. Summary.srt
2.97 KB
04. Understanding Principals, Objects, and Role-based Security/01. Introduction.mp4
1.8 MB
04. Understanding Principals, Objects, and Role-based Security/01. Introduction.srt
1.73 KB
04. Understanding Principals, Objects, and Role-based Security/02. Principals in SQL Server.mp4
4.75 MB
04. Understanding Principals, Objects, and Role-based Security/02. Principals in SQL Server.srt
5.05 KB
04. Understanding Principals, Objects, and Role-based Security/03. Understanding Roles and Groups.mp4
2.71 MB
04. Understanding Principals, Objects, and Role-based Security/03. Understanding Roles and Groups.srt
2.16 KB
04. Understanding Principals, Objects, and Role-based Security/04. Demo- Creating and Managing Principals with Roles.mp4
9.17 MB
04. Understanding Principals, Objects, and Role-based Security/04. Demo- Creating and Managing Principals with Roles.srt
7.23 KB
04. Understanding Principals, Objects, and Role-based Security/05. Demo- Adding and Removing Principals from Groups.mp4
6.69 MB
04. Understanding Principals, Objects, and Role-based Security/05. Demo- Adding and Removing Principals from Groups.srt
5.44 KB
04. Understanding Principals, Objects, and Role-based Security/06. Certificates and Asymmetric Keys.mp4
4.26 MB
04. Understanding Principals, Objects, and Role-based Security/06. Certificates and Asymmetric Keys.srt
4.1 KB
04. Understanding Principals, Objects, and Role-based Security/07. Demo- Certificates and Asymmetric Keys in SQL Server.mp4
8.69 MB
04. Understanding Principals, Objects, and Role-based Security/07. Demo- Certificates and Asymmetric Keys in SQL Server.srt
6.91 KB
04. Understanding Principals, Objects, and Role-based Security/08. Objects and Security Considerations.mp4
3.73 MB
04. Understanding Principals, Objects, and Role-based Security/08. Objects and Security Considerations.srt
3.2 KB
04. Understanding Principals, Objects, and Role-based Security/09. Demo- Granting and Revoking Permissions on Objects.mp4
12.18 MB
04. Understanding Principals, Objects, and Role-based Security/09. Demo- Granting and Revoking Permissions on Objects.srt
6.17 KB
04. Understanding Principals, Objects, and Role-based Security/10. Schema Bound Objects and Security.mp4
2.25 MB
04. Understanding Principals, Objects, and Role-based Security/10. Schema Bound Objects and Security.srt
2.33 KB
04. Understanding Principals, Objects, and Role-based Security/11. Demo- Schema Bound Objects and Security.mp4
4.79 MB
04. Understanding Principals, Objects, and Role-based Security/11. Demo- Schema Bound Objects and Security.srt
3.88 KB
04. Understanding Principals, Objects, and Role-based Security/12. Summary.mp4
3.75 MB
04. Understanding Principals, Objects, and Role-based Security/12. Summary.srt
3.22 KB
sql-server-security-fundamentals.zip
23.91 MB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。