Expand/collapse navigation
Home
News
Contact Us
Cloud Computing
Cloud Presentation
Databases
Database Security 2021
SQL Injection Attacks
Access Controls
Software Design
Software Design Continued...!
App/Sys Develop
Release/Deploy
Agile Development
Encryption
Cryptography
Business Planning
Env/Phys Security
Cell Phone Networks
CDMA Network
GSM Network
The Great Sims Heist
LC and G Regs
LC and G Regs - Continued....!
Risk Mngmt
Risk Mngmt...Continued
Viruses/Hacking
SolarWinds
DDOS Attacks
Buffer Overflow
Wireless Hacking P1
Wireless Hacking P2
Stuxnet Virus
Conflicker Virus
Hacking BotNets
Home
News
Contact Us
Cloud Computing
Databases
Database Security 2021
SQL Injection Attacks
Access Controls
Software Design
Business Planning
Env/Phys Security
Cell Phone Networks
LC and G Regs
Risk Mngmt
Viruses/Hacking
Databases
Table of Content
SQL Roles p4 to p6
Security
Fixed Server Roles
Servers
Integrity
Learn SQL Server p6 to
Fixed Server-Level Roles
Working with Server-Level Roles
Permissions and other Fixed Server Roles
Login Triggers & SQL Server Permissions
Back-up and Restore Strategies
Indexes
Replication
Explore Data Fundamentals
Data Definition Language (DDL)
(DDL) code examples
Data Manipulation Language (DML)f
(DML) code examples
General Rules for Database Code
Data Type
Numeric Types
Character Data Types
Spatial data Types
Binary Data Types
Operators and Unions
Intersect/Except & Aggregate functions
Indexes
Stored Procedures
Views
Replication
Backup and Restore Strategies
Database Fundamental Storage
Database Life Cycle
Plan the Physical Design
Normalization
Primary Key
Composite Keys
Advance SQL Query Tuning
Indexes Save Scanning
Types of Indexes
Joining Tables
Nested Loop Joins
Hash Joins
Sort Merge Joins
Partitioning Data:
With SQL Server Profiler
More on Types of Indexes
Types of Joins
Triggers – Stored Procedures and Functions
Functions
Stored Procedure
Steps query runs
Triggers
Input and output perimeters
Cursor’s
Transactions
Functions
Recursion
Table-Value Function
After Trigger
Instead Triggers
Nested Triggers
Triggers Database Level
Insert
Update Stored Procedure
Delete Rules
C# in visual studio for SQL
Installing a DLL – CLR Strict Security
Differences SQL vs C#
Web Developing
Fundamental Administration
Code to Create Tables and Data
Authentication Options
Fixed Server Roles
Security Roles
Windows Authentication
SQL Server Roles
Fixed Server Roles
Public Roles
User-Defined Roles
Fixed Server Roles
Object Permissions
Guest Accounts
Reporting Services
Present Data
Report Builder
Web Portal
Installing Reporting Services
Web Interface
Report Builder
Location of Downloads for Reporting Services
Report Components
Formatting a Report
Shared Connection – Connection String
Shared Data Set
Grouping Records
Parameter as a filter
Hyper Link Actions
Charts
Gage
Designing DB Solutions for SQL Server
Database Development and Design
All Things Databases
Database Development and Design.pdf
Adobe Acrobat document [2.5 MB]
Database Security 2021
SQL Injection Attacks
Lance West
DigiBrains@msn.com
Cyber-Security
Information Assurance training
IT Risk Analysis
BIA/BCP Development
Software Security
Databases