My technical skills
My picture album
My code library
Search my site
Sign my guestbook
SQL Server Articles New
Database encryption for SQL Server and MSDE:
The cover page of this book says, "Practical strategies and proven techniques for building secure applications in a networked world". And that's exactly what you'll find inside this book. The authors are top security experts, from Windows XP team and Microsoft's new trustworthy computing initiative. This book touches upon design pointers for developing secure applications, security testing methodologies across technologies like Win32 applications, COM, DCOM, .Net and web applications. The excellent text is supported by great code snippets through out the book.
In today's world of software vulnerabilities, buffer overruns and other code exploits, when every major software vendor is releasing security hotfixes almost every week, I believe this book is a life saver. Most of these vulnerabilities are a result of careless programming, no attention to security, improper testing. This book addresses all these issues and shows you how to design and create secure applications, how to write robust code, how to test software for security vulnerabilities.
Who should read this book? I would say, "Every developer". Building secure and robust applications is paramount, If you are a software vendor, or a services company or anyone who develops and sells software. You'd rather drop a feature, but not compromise security. This book provides an indepth understanding of security concepts for developers, software architects, application designers, project managers and testing professionals.
Finally, why is this book being featured on an SQL Server website? Because, this book also discusses database related security issues like SQL Injection. Further, databases are an integral part of today's enterprise level applications and it is important to make your application's data access modules as secure as possible. Also, I'm sure, many of you SQL Server developers, also develop Windows and web applications.
The accompanying CD contains all the code snippets from the book, a completely searchable electronic version (eBook) of this book and some helpful security tools.
Overall, it is a great book and should be on every developer's bookshelf. Let me quickly walk you through the chapters:
Chapter 1: The Need for Secure Systems
Chapter 2: Designing Secure Systems
Chapter 3: Public Enemy #1: the Buffer Overrun
Chapter 4: Determining Good Access Control
Chapter 5: Running with Least Privilege
Chapter 6: Cryptographic Foibles
Chapter 7: Storing Secrets
Chapter 8: Canonical Representation Issues
Chapter 9: Socket Security
Chapter 10: Securing RPC, ActiveX Controls, and DCOM
Chapter 11: Protecting Against Denial of Service Attacks
Chapter 12: Securing Web-Based Services
Chapter 13: Writing Secure .NET Code
Chapter 14: Testing Secure Applications
Chapter 15: Secure Software Installation
Chapter 16: General Good Practices
The following chapters are included in the appendix:
A: Dangerous APIs
B: The Ten Immutable Laws of Security
C: The Ten Immutable Laws of Security Administration
D: Lame Excuses We've Heard
Click here for more information or to buy this book from: Amazon.com or Amazon.co.uk or Amazon.ca