Chapter 9. Designing a Database Security Plan Terms you'll need to understand:LoginUserRoleEncryptionAuditingC2 securityPermissions Techniques you'll need to master:Granting permissionsCreating loginsAssigning database access to usersCreating database objectsCreating roles and assigning users to rolesUsing application roles
|