results matching 
 results
This guide is the second in a series of articles that covers SQL Server security best practices.
SQL Server security is perhaps one of the most overlooked facets of database server maintenance. Without taking the necessary precautions, an instance of SQL Server can be ripe for abuse and failure.
Many software applications use a relational database management system (RDBMS) to store data. As the database grows, it becomes more time-and-storage intensive to store the data.
User management and permissions are essential to SQL database security. Typically, SQL database security schemes consist of one or more users, their authentication, and permissions.
In relational database systems, a database index is an extremely powerful tool for data retrieval. In this guide, you learn about unique indexes, primary keys, and composite primary keys.
One of the most powerful aspects of SQL is the ability to perform data aggregation. Two of the most powerful SQL data aggregation tools are grouping and totaling.
Choosing the proper data type for a table column is an important decision. It reduces the need for data type conversions, enhances the performance of database queries, and minimizes storage requirements.
Traditionally, you pull data from two or more tables using a WHERE clause in a query.
In today’s world of increased digitization, big data, and cloud computing, data management is amongst the most important skills a software engineer can have.
Bummer! The page you were looking for wasn't found. You can browse our articles or try searching.