Microsoft SQL Server 2008 For Dummies

About the Author
Mike Chapple, MCDBA, CISA, CISSP is an IT professional with over ten
years’ experience with SQL Server. He currently serves as an IT professional
with the University of Notre Dame, where he also teaches an
undergraduate computer applications course. Mike actively participates
as a subject matter expert in the SQL Server community and writes
extensively on SQL Server at the Guide to Databases. He also
serves on the Center for Internet Security SQL Server security standard
development team.
Mike is a technical editor for Information Security Magazine and is author
of several books, including Information Security Illuminated and the CISSP
Prep Guide. Mike holds a BS in computer science from the University of
Notre Dame, an MS in computer science from the University of Idaho,
and an MBA from Auburn University.

Related Articles

Computer Viruses for Dummies

Computer viruses–just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:

Understand the risks and analyze your PC’s current condition Select, install, and configure antivirus software Scan your computer and e-mail Rid your computer of viruses it’s already caught Update antivirus software and install security patches Use firewalls and spyware blockers Protect handheld PDAs from viruses Adopt safe computing practices, especially with e-mail and when you’re surfing the Net Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don’t protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

Microsoft SQL Server 2005 for Dummies

Now updated to reflect the much-anticipated “Yukon” release of SQL Server, this friendly guide shows database developers and administrators as well as those who use database application how to get up to speed fast Offers a gentle introduction to relational database design and shows how to build databases, create database applications, and maintain and optimize database performance Covers the major new features of the “Yukon” release-including analysis services, reporting services, and notification services

Blocking Spam and Spyware for Dummies

Fight back and save money with these expert tips

Find out what spam and spyware cost your company, and how to stop them

Whether yours is a one-person business or a multi-million dollar corporation, here’s help giving spammers and spies the bum’s rush. Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean-counters why such defenses are essential.

Discover how to

* Understand how spammers get addresses
* Calculate the cost of spam and spyware
* Re-engineer your business processes
* Select spam and spyware filters
* Manage implementation and maintenance

Hacking Wireless Networks For Dummies

Become a cyber-hero – know the common wireless weaknesses
“Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.”
–Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient – not only for you, but also for those nefarious types who’d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network’s armor.

Discover how to:
– Perform ethical hacks without compromising a system
– Combat denial of service and WEP attacks
– Understand how invaders think
– Recognize the effects of different hacks
– Protect against war drivers and rogue devices

Microsoft SQL Server 2005 Programming For Dummies

Create and modify databases and keep them secure
Get up to speed on using T-SQL to store and manipulate data
SQL Server 2005 improves an already great database management system. This book shows you how to put it to work in a hurry. You’ll find out how to use the SQL Server Management Studio and the SQLCMD utility to write T-SQL code, retrieve data from single or multiple SQL Server tables, add data using the INSERT statement, and much more.
* Create queries to retrieve data
*Ensure SQL Server security
*Use Visual Studio(r) 2005 with SQL Server
*Create tables, views, and indexes
*Work with Common Language Runtime
*Query XML data