Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 6: IBM DB2 Universal Database
Figure 6-1: DB2 processes.
Chapter 21: Microsoft SQL Server Architecture
Figure 21-1: Packet dump of the authentication process.
Chapter 23: Securing SQL Server
Figure 23-1: Setting the authentication mode.
Figure 23-2: Changing the authentication mode.
Figure 23-3: Removing the SQL Server account.
Previous page
Table of content
Next page
The Database Hackers Handbook: Defending Database Servers
ISBN: 0764578014
EAN: 2147483647
Year: 2003
Pages: 156
Authors:
David Litchfield
,
Chris Anley
,
John Heasman
,
Bill Grindlay
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Risk Terminology
Risk Assessment Best Practices
Best Practices for Quantitative and Qualitative Risk Assessment
Audit and Compliance
Notice
Metrics and Models in Software Quality Engineering (2nd Edition)
Criteria for Causality
Exponential Distribution and Reliability Growth Models
Satisfaction with Company
Measuring Process Maturity
Getting Started with a Software Metrics Program
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Command-Line Completion
Virtual Terminals (VTYs)
Distance-Vector and Link-State Routing Protocols
Interior Routing Protocols
Switches and VLANs
Cisco Voice Gateways and Gatekeepers
Chapter Review Questions
Securing H.323 Gateways
MGCP Gateway Fallback
Basic Configuration
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 19. Analyze Elevation Profiles for Wireless Community Networks
Hack 53. Visualize Your Tracks in Three Dimensions
Hack 58. Dont Lose Your Tracklogs!
Hack 76. Explore the Effects of Global Warming
Hack 93. Node Runner
GO! with Microsoft Office 2003 Brief (2nd Edition)
Project 1A. College and Career Information
Chapter One. Basic Computer Concepts
Objective 4. Use Special Character Formats
Project 4B. Water Matters
Objective 13. Use a Summary Sheet
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies