In my next several posts, I'd like to take a good look at SQL Server security. We'll primarily focus on SQL Server 2008 R2, which is the latest release. Many of the concepts I plan to discuss will ...
Last time, we talked about security from a user's point of view. In this post, let's discuss how applications should authenticate with SQL Server. Like user logins, application logins need to be ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results