CHECK 发表于 2025-3-23 10:55:22

http://reply.papertrans.cn/87/8634/863350/863350_11.png

Nausea 发表于 2025-3-23 15:58:29

http://reply.papertrans.cn/87/8634/863350/863350_12.png

招募 发表于 2025-3-23 20:36:18

http://reply.papertrans.cn/87/8634/863350/863350_13.png

amenity 发表于 2025-3-23 22:25:47

Security Metadata,QL. Even for metadata that can be viewed through the GUI, such as the roles that a database user belongs to, there are times that it is best to use T-SQL; for example, if you need to script an action that you perform on a regular basis, or if you need to review metadata for many principals.

出处 发表于 2025-3-24 03:01:44

http://reply.papertrans.cn/87/8634/863350/863350_15.png

Facilities 发表于 2025-3-24 08:44:20

http://reply.papertrans.cn/87/8634/863350/863350_16.png

dapper 发表于 2025-3-24 14:21:52

http://reply.papertrans.cn/87/8634/863350/863350_17.png

闲逛 发表于 2025-3-24 15:53:58

http://reply.papertrans.cn/87/8634/863350/863350_18.png

FRAX-tool 发表于 2025-3-24 21:50:51

http://reply.papertrans.cn/87/8634/863350/863350_19.png

larder 发表于 2025-3-25 02:53:09

http://reply.papertrans.cn/87/8634/863350/863350_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Securing SQL Server; DBAs Defending the D Peter A. Carter Book 20161st edition Peter A. Carter 2016 Encryption.Auditing.Security auditing.H