Chapter 9. Designing a Database Security Plan
Terms you'll need to understand: Login User Role Encryption Auditing C2 security Permissions
Techniques you'll need to master: Granting permissions Creating logins Assigning database access to users Creating database objects Creating roles and assigning users to roles Using application roles
|