Hack Your Database Before the Hackers Do

Thursday May 1st 2008 by DatabaseJournal.com Staff
Share:

Tools and techniques to help you discover SQL Server security weaknesses.

[From SQL Server Magazine]

Occasionally, there are miscellaneous attributes, such as yes/no attributes or comment attributes, that don’t fit into tight star schemas. Rather than discarding flag fields and yes/no attributes, place them in a junk dimension. In addition, you can handle comment and open-ended text attributes by creating a text-based junk dimension.

The article continues at http://www.sqlmag.com/Articles/Index.cfm?ArticleID=98576

Share:
Home
Mobile Site | Full Site
Copyright 2017 © QuinStreet Inc. All Rights Reserved