Critical Status - Database-Oriented Issues Plus

It seems that everything has a critical status, especially when it comes to databases and software development! Here's a place for listing issues and ideas relating to database and development issues. I'll list problems and ideas mainly related to SQL Server 2005. Post your thoughts, advice or complaints! Later this year will be the 25th anniversary of being in the trenches of the IT industry. I specialize in database applications development. I'd like to share my experiences with everyone and learn of those of others. You never stop learning.

Thursday, May 29, 2008

SQL Server Forensic Analysis

SQL Server Forensic Analysis
By: Kevvie Fowler
Last Updated on Safari: 2008/04/05
Publisher: Addison Wesley Professional
Pub Date: December 12, 2008 (estimated)
Pages: 179


Nearly all forensic investigations reach a turning point when investigators determine that a database has been breached. There may be no third-party logging system in place, but security personnel are still left wondering if credit card data was stolen or if their system was modified.

The situation is made all the more alarming by the fact that large database breaches are increasing in frequency and that, if investigators are unable to assess and qualify the scope of an intrusion, they are forced to report it as a possible compromise.

These disclosures are painful for companies, their customers, and their shareholders. They are even more painful when, in fact, no sensitive data was ever compromised.

The best way to prevent such breaches and inaccurate reporting is to perform forensic analysis on the SQL server and be certain of extent of any attack or breach.

In SQL Server Forensic Analysis, author Kevvie Fowler presents the first in-depth look into how SQL Server forensics can be used to identify and extract the database evidence needed to confirm, assess, and investigate a digital intrusion.The book begins by giving the reader an overview of SQL server forensics and key SQL server database components, then proceeds to a concise and clear look at database forensic techniques that can be used to gather the evidence hidden within the published and unpublished areas of a SQL server.

Readers will learn how to prioritize, acquire, and analyze database evidence using forensically sound practices and free industry tools. The final chapter will include a case study that demonstrates all the techniques from the book applied in a walk-through of a real-world investigation.This book is appropriate for a wide range of professionals, including digital forensic practitioners, information security analysts, information security managers, database administrators, auditors, and law enforcement professionals. Readers will walk away from the book able to do the following:
  • Use SQL Server forensics to verify and assess a digital intrusion
  • Identify and extract database information from published and unpolished areas of SQL Server
  • Build a SQL sever forensic toolkit
  • Detect and Remove SQL Server rootkits
  • Recover and reconstruct deleted database material
  • SQL Server Forensic Analysis is a must-have book for anyone charged with preventing or investigating modern digital intrusions.

    Purchase "SQL Server Forensic Analysis" - Retail Price: USD $54.99
    Top of Form
    Online, PDF and Print Book Bundle
    USD $74.23
    Online and PDF Access
    USD $38.49
    Print Book Pre-Order USD $54.99
    USD $38.49
    Bottom of Form

1 comment:

daspeac said...

I have heard about another way of repair mdf corrupt gimana. Besides, you can visit my blogs at: or where I’m trying to share my experience with regard to data corruption issues