Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 6: IBM DB2 Universal Database
Figure 6-1: DB2 processes.
Chapter 21: Microsoft SQL Server Architecture
Figure 21-1: Packet dump of the authentication process.
Chapter 23: Securing SQL Server
Figure 23-1: Setting the authentication mode.
Figure 23-2: Changing the authentication mode.
Figure 23-3: Removing the SQL Server account.
Previous page
Table of content
Next page
The Database Hackers Handbook: Defending Database Servers
ISBN: 0764578014
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
David Litchfield
,
Chris Anley
,
John Heasman
,
Bill Grindlay
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Why Risk Assessment
Risk-Assessment Methodologies
Risk-Assessment Terminology
Reducing the Risk of an Attack
Executive Summary
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Jump Start with SWT/JFace
Basic SWT Widgets
Other Important SWT Components
Drag and Drop and the Clipboard
Printing
Network Security Architectures
Device Hardening
References
Identity Considerations
Protocol Capabilities
Conclusions
Data Structures and Algorithms in Java
List Nodes
Vocabulary
Projects
Vocabulary
Vocabulary
GDI+ Programming with C#
Rendering Text with Quality and Performance
Working with Icons
Alpha Blending
Text Transformation
A Brief History of Printing with Microsoft Windows
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Strings and Regular Expressions
Objects, Interfaces, and Patterns
Files and Directories
XML
Windows Programming
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies