资源详情

返回首页 | 相关搜索
[ FreeCourseWeb.com ] Securing SQL Server Applications
大小 353.31 MB
文件数 55
Info Hash: AC44766FB6A3346E589010A76178037EB2E57548
收录时间 2026-01-19 06:06:49
更新时间 2026-01-19 06:06:49
文件列表 (55)
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4
3.59 MB
~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt
2.11 KB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/1. SQL Server Security Overview.mp4
11.75 MB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/1. SQL Server Security Overview.vtt
9.94 KB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/2. Understanding the Significance of Securing Application Data.mp4
4.46 MB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/2. Understanding the Significance of Securing Application Data.vtt
4.17 KB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/3. Recognizing Security Threats and Vulnerabilities.mp4
6.31 MB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/3. Recognizing Security Threats and Vulnerabilities.vtt
5.34 KB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/4. Security Best Practices for Applications Accessing SQL Server.mp4
4.58 MB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/4. Security Best Practices for Applications Accessing SQL Server.vtt
3.25 KB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/5. Using SSL with Client Connections.mp4
16.38 MB
~Get Your Files Here !/2. Introduction to Advanced Security Topics/5. Using SSL with Client Connections.vtt
7.75 KB
~Get Your Files Here !/3. Auditing/1. Purpose and Advantages of Auditing and Logging.mp4
24.11 MB
~Get Your Files Here !/3. Auditing/1. Purpose and Advantages of Auditing and Logging.vtt
9.1 KB
~Get Your Files Here !/3. Auditing/2. Setting up SQL Server Auditing at the Instance Level.mp4
33.68 MB
~Get Your Files Here !/3. Auditing/2. Setting up SQL Server Auditing at the Instance Level.vtt
12.45 KB
~Get Your Files Here !/3. Auditing/3. Setting up SQL Server Auditing in a Database.mp4
12.45 MB
~Get Your Files Here !/3. Auditing/3. Setting up SQL Server Auditing in a Database.vtt
4.08 KB
~Get Your Files Here !/3. Auditing/4. Reading and Interpreting Audit Logs.mp4
28.42 MB
~Get Your Files Here !/3. Auditing/4. Reading and Interpreting Audit Logs.vtt
7.83 KB
~Get Your Files Here !/4. Encryption in SQL Server/1. Understanding Encryption for Data Security.mp4
5.28 MB
~Get Your Files Here !/4. Encryption in SQL Server/1. Understanding Encryption for Data Security.vtt
4.78 KB
~Get Your Files Here !/4. Encryption in SQL Server/2. Using Hash Functions for Password Storage.mp4
12.4 MB
~Get Your Files Here !/4. Encryption in SQL Server/2. Using Hash Functions for Password Storage.vtt
6.11 KB
~Get Your Files Here !/4. Encryption in SQL Server/3. Encrypting Data in SQL Server.mp4
20.85 MB
~Get Your Files Here !/4. Encryption in SQL Server/3. Encrypting Data in SQL Server.vtt
9.3 KB
~Get Your Files Here !/4. Encryption in SQL Server/4. Encrypting Column Data.mp4
15.34 MB
~Get Your Files Here !/4. Encryption in SQL Server/4. Encrypting Column Data.vtt
7.1 KB
~Get Your Files Here !/4. Encryption in SQL Server/5. Encrypting Data at Rest.mp4
16.05 MB
~Get Your Files Here !/4. Encryption in SQL Server/5. Encrypting Data at Rest.vtt
8.95 KB
~Get Your Files Here !/4. Encryption in SQL Server/6. Using Always Encrypted.mp4
24.85 MB
~Get Your Files Here !/4. Encryption in SQL Server/6. Using Always Encrypted.vtt
12.1 KB
~Get Your Files Here !/4. Encryption in SQL Server/7. Setting up Always Encrypted with Secure Enclaves.mp4
17.94 MB
~Get Your Files Here !/4. Encryption in SQL Server/7. Setting up Always Encrypted with Secure Enclaves.vtt
8.16 KB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/1. Understanding SQL Injections.mp4
9.08 MB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/1. Understanding SQL Injections.vtt
6.04 KB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/2. Real World Injection Threats.mp4
10.23 MB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/2. Real World Injection Threats.vtt
4.85 KB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/3. Protecting T-SQL Code Against Injections.mp4
8.35 MB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/3. Protecting T-SQL Code Against Injections.vtt
3.96 KB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/4. Using Properly Stored Procedures and Dynamic SQL.mp4
11.15 MB
~Get Your Files Here !/5. Fighting SQL Injection Attacks/4. Using Properly Stored Procedures and Dynamic SQL.vtt
7.34 KB
~Get Your Files Here !/6. Tools for Compliance Regulations/1. Introduction to Compliance Regulations.mp4
3.6 MB
~Get Your Files Here !/6. Tools for Compliance Regulations/1. Introduction to Compliance Regulations.vtt
2.55 KB
~Get Your Files Here !/6. Tools for Compliance Regulations/2. Masking Sensitive Data Using Dynamic Data Masking.mp4
11.72 MB
~Get Your Files Here !/6. Tools for Compliance Regulations/2. Masking Sensitive Data Using Dynamic Data Masking.vtt
4.99 KB
~Get Your Files Here !/6. Tools for Compliance Regulations/3. Keeping History Using Temporal Tables.mp4
20.31 MB
~Get Your Files Here !/6. Tools for Compliance Regulations/3. Keeping History Using Temporal Tables.vtt
9.17 KB
~Get Your Files Here !/6. Tools for Compliance Regulations/4. Introduction to Database Ledger.mp4
3.07 MB
~Get Your Files Here !/6. Tools for Compliance Regulations/4. Introduction to Database Ledger.vtt
3.16 KB
~Get Your Files Here !/6. Tools for Compliance Regulations/5. Using SQL Server Ledger.mp4
17.17 MB
~Get Your Files Here !/6. Tools for Compliance Regulations/5. Using SQL Server Ledger.vtt
7.05 KB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/playlist.m3u
1.93 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。