A proven methodology for securing database servers
An explanation of the most common database server threats
Steps to secure your server
A reference table that illustrates a secure database server