SQLServer2012 the end of book learning

Chapter XIV SQL Server security management

      Objective understanding of database security mechanisms understand the concept of user roles and permissions to grasp the concept of user roles and permissions management approach to understanding architecture set the authentication mode in the Database

      1 database security mechanisms for providing different security database contains 2012 different levels of authentication, rights management, data encryption and secret key management, user and architecture, policy-based color management and audit and other safety measures

      2 times introduce authentication management and user rights management security mechanism mainly includes the authentication mode (how landing) login account () Database User () user permissions (what operating authority for the database table, use a database and grant roles to achieve given)

      

. 1 - Create login name
 2  the CREATE mydba the LOGIN
 . 3   the WITH PASSWORD = ' 123 ' , DEFAULT_DATABASE = XK
 . 4 - Creating a user database
 . 5  the CREATE shishi the USER
 . 6 ---- use sp_addrolemember dbo rights granted to the user
 . 7  sp_addrolemember the db_owner shishi
 . 8  sp_droprolemember the db_owner shishi
 . 9 - use GRANT REVOKE DENY object rights management statement
 10  the GRANT the CREATE TABLE shishi the tO
 . 11  the GRANT Course the tO shishi the ON the SELECT
 12 is  the GRANT the INSERT, the UPDATE, the DELETE shishi the ON Elective the tO
 13 is REVOKE CREATE TABLE FROM shishi

Chapter XV maintenance of the database

    Objectives Understand the concept of backup and recovery grasp the concept of backup devices will be online or offline database backup and restore the database and the database will be imported View full grasp of backup equipment system stored procedures

    SQL Server 2012 database backup in three full recovery model, bulk-logged recovery model and simple recovery mode

    (Contents changed since the last backup) full backup mode four backup of the database (backup database of all content) Differential backup transaction log backup (back up only the contents of the transaction log) backup of files and file groups

    Restore the database to ensure that the database is in exclusive state

    Import and export database, to set the data source, deriving device, data to be transmitted, to complete the operation

Guess you like

Origin www.cnblogs.com/27floor/p/11261761.html