This session will cover advanced security topics in the Analysis Services Multidimensional model.
SQL Server Code Name Denali Reporting Services will include Project Crescent for visualizing, interacting with and presenting data. Project Crescent. Come to this session to see how to make the most of this new tool.
This talk looks at MDX and DAX, examining their similarities and differences. It won’t turn you into an expert in either but it will help you to decide, given your particular career plans, if either or both are worth learning.
Basic outline of SQL Azure: How SQL Azure fits in with other Azure Storage Options. Main differences between SQL Azure and SQL 2008. Brief new design challenges.
In this session I’ll show you how to maintain security and development rigour whilst allowing the developers to use ORM tools.
SQL Injection attacks are one of the most common hacker tricks used on the web. Learn all about SQL Injection attacks in this perennially favorite session.
SQL injection can happen to you! But SQL injection is also very easy to prevent. Learn the ins and outs of SQL injection so that you don't become a victim.
This session will investigate using Stream Insight, SQL Server and Analysis Services to provide an example framework to monitor cube usage as well as suggest a mechanism for highlighting areas for performance and security enhancements.
A typical day of DBA and new features of SQL Server 2008 can help - save a minute.
In this talk Colin Mackay will show you what a SQL Injection Attack is, what they look like, how they work and most importantly how to defend against them.
In this talk we will contrast and compare developing WebForm applications using Visual Studio 2008 with different types of datasources. We will be looking at design issues relating to concurrency control and updateability when using key Visual Studio controls such as the FormView and ListView controls. So if you don’t know where to start in choosing between SQL, LINQ and Entity datasources then you will by the end of this talk. We will also take a look at techniques for the seamless integration of ASP.net security with SQL Server Login security for web applications using LINQ.
SQL Server is regularly targeted by hackers as it is a repository of sensitive data for organizations. If breached, hackers can gain access to confidential information including, but not limited to credit card numbers, social security numbers, and marketing information. This presentation covers topics pertaining to best practices and tips on how to secure and harden a SQL Server 2008 & 2005 implementation. Some of the security and hardening topics covered include: minimize surface area with policy based management, encryption, advanced auditing, configuring a Windows Server 2008 firewall, applying security templates with Active Directory, and consolidating SQL Server logs.