In this purely demo-based session, I will show several real-life attacks, from mere reading up to disrupting service availability via various types of manual and automated SQL Injection, including a broadly unknown elevation of privileges attack.
What are the techniques to implement linked reports, subscriptions, report history, snapshot options, editing report using browser based Report Builder? Find out in this session.
Everyone knew how to keep data safe and secure, right up until Edward Snowden revealed this error. Learn how to keep the data secure, by identifying and quantifying the risks. Take away practical tips and advice to apply immediately.
This session targets SSAS developers that are already dealing with complex security solutions on a regular basis and want to get more insights on what actually happens inside SSAS when the different kinds of security are applied to their model.
This session shows how you can use SQL Server 2014’s features to meet your solution’s non-functional requirements and ensure operational success.
SQL Server Code Name Denali Reporting Services will include Project Crescent for visualizing, interacting with and presenting data. Project Crescent. Come to this session to see how to make the most of this new tool.
This talk looks at MDX and DAX, examining their similarities and differences. It won’t turn you into an expert in either but it will help you to decide, given your particular career plans, if either or both are worth learning.
Basic outline of SQL Azure: How SQL Azure fits in with other Azure Storage Options. Main differences between SQL Azure and SQL 2008. Brief new design challenges.
SQL Injection attacks are one of the most common hacker tricks used on the web. Learn all about SQL Injection attacks in this perennially favorite session.
This session will investigate using Stream Insight, SQL Server and Analysis Services to provide an example framework to monitor cube usage as well as suggest a mechanism for highlighting areas for performance and security enhancements.