In this purely demo-based session, I will show several real-life attacks, from mere reading up to disrupting service availability via various types of manual and automated SQL Injection, including a broadly unknown elevation of privileges attack.
This session covers all aspects of what you need to do, to enable the storage of card details in SQL Server and achieve PCI certification.
We will deep dive into the solutions for storing the data securely using SQL Servers encryption functionality
What are the techniques to implement linked reports, subscriptions, report history, snapshot options, editing report using browser based Report Builder? Find out in this session.
Everyone knew how to keep data safe and secure, right up until Edward Snowden revealed this error. Learn how to keep the data secure, by identifying and quantifying the risks. Take away practical tips and advice to apply immediately.
This session targets SSAS developers that are already dealing with complex security solutions on a regular basis and want to get more insights on what actually happens inside SSAS when the different kinds of security are applied to their model.
This session shows how you can use SQL Server 2014’s features to meet your solution’s non-functional requirements and ensure operational success.
Attend this session to learn more about Governed Data discovery, get an overview of BI Office and find out why so many Microsoft customers are investing in this innovative BI Platform.
PowerPivot is a breakthrough for self-serve BI but is not easily deployed in the enterprise. Join us for this fast-paced, technical demonstration on how to upgrade PowerPivot into secure and scalable Analysis Services tabular cubes
This session will cover advanced security topics in the Analysis Services Multidimensional model.
SQL Server Code Name Denali Reporting Services will include Project Crescent for visualizing, interacting with and presenting data. Project Crescent. Come to this session to see how to make the most of this new tool.
This talk looks at MDX and DAX, examining their similarities and differences. It won’t turn you into an expert in either but it will help you to decide, given your particular career plans, if either or both are worth learning.
Basic outline of SQL Azure: How SQL Azure fits in with other Azure Storage Options. Main differences between SQL Azure and SQL 2008. Brief new design challenges.
In this session I’ll show you how to maintain security and development rigour whilst allowing the developers to use ORM tools.
SQL Injection attacks are one of the most common hacker tricks used on the web. Learn all about SQL Injection attacks in this perennially favorite session.
SQL injection can happen to you! But SQL injection is also very easy to prevent. Learn the ins and outs of SQL injection so that you don't become a victim.
This session will investigate using Stream Insight, SQL Server and Analysis Services to provide an example framework to monitor cube usage as well as suggest a mechanism for highlighting areas for performance and security enhancements.
A typical day of DBA and new features of SQL Server 2008 can help - save a minute.
In this talk Colin Mackay will show you what a SQL Injection Attack is, what they look like, how they work and most importantly how to defend against them.
In this talk we will contrast and compare developing WebForm applications using Visual Studio 2008 with different types of datasources. We will be looking at design issues relating to concurrency control and updateability when using key Visual Studio controls such as the FormView and ListView controls. So if you don’t know where to start in choosing between SQL, LINQ and Entity datasources then you will by the end of this talk. We will also take a look at techniques for the seamless integration of ASP.net security with SQL Server Login security for web applications using LINQ.
SQL Server is regularly targeted by hackers as it is a repository of sensitive data for organizations. If breached, hackers can gain access to confidential information including, but not limited to credit card numbers, social security numbers, and marketing information. This presentation covers topics pertaining to best practices and tips on how to secure and harden a SQL Server 2008 & 2005 implementation. Some of the security and hardening topics covered include: minimize surface area with policy based management, encryption, advanced auditing, configuring a Windows Server 2008 firewall, applying security templates with Active Directory, and consolidating SQL Server logs.