×

Cherish Wang

421 Reputation

Follow
Activities(11) Posts(11) Series(0) Areas of Expertise Following Followers
Areas of Expertise

Following (0)

See All

Followers (0)

See All

Row-level Security Solutions for MSSQL

In this tutorial, you will learn how to implement data access control solutions using the new Row Level Security feature introduced by SQL Server 2016.

Mask Privacy Data Columns in MSSQL

In this tutorial, you will learn how to use the dynamic data masking feature of SQL Server 2016 to mask privacy data.

Enable SSL Encryption for an MSSQL Network Transport Layer

In this tutorial, you will learn how to enable SSL encryption for the network transport layer of your SQL Server.

Enable Always Encrypted for Your MSSQL Databases

In this tutorial, you will learn how to enable Always Encrypted to ensure that the data stored in your SQL databases on the cloud is continually encrypted.

Database Backup Encryption in MSSQL

In this tutorial, you have learned how to use certificates to implement database backup encryption in SQL Server 2014 and later.

SQL Server Best Practices: Migrating Multiple Instance-level Databases to ApsaraDB RDS for SQL Server

This article describes how you can migrate multiple on-premises or self-created instance-level databases on ECS to Alibaba Cloud RDS SQL Server in just one click.

SQL Server Best Practices: Migrating to ApsaraDB RDS for SQL Server Using SDK

In this article, we'll discuss how you can implement the migration of a SQL Server database to Alibaba Cloud ApsaraDB RDS for SQL Server through the RDS SDK.

SQL Server Best Practices: Using Filegroups to Implement Cold and Hot Data Isolation Backup Solution

In this article of the SQL Server best practices series, we will show you how SQL Server can use filegroups to implement a cold and hot data isolation backup solution.

SQL Server Best Practices: Database Recovery Models and Backups

In this article of the SQL Server best practices series, we will discuss the about three database recovery models and their application scenarios.

SQL Server Best Practices: Monitoring Backup and Restore Progress

In this article of the SQL Server best practices series, we will learn how to monitor the progress of SQL Server Backup & Restore to minimize faults and errors.

SQL Server Best Practices: Using Asymmetric Keys to Implement Column Encryption

In this article of the SQL Server best practices series, we will learn how to solve common security problems with symmetric encryption by using asymmetric keys.

Latest Comments

Dikky Ryan Pratama Commented on Database Backup Encryption in MSSQL

I wanted to take a moment to express my gratitude for the wonderful article you recently published on Alibaba Cloud Blog. Your writing was engaging and insightful, and I found myself fully immersed in the content from start to finish.The way you presented the information was both informative and easy to understand, which made it an enjoyable read for me. Your hard work and dedication to providing high-quality content are truly appreciated.Thank you once again for sharing your knowledge and expertise on this subject. I look forward to reading more of your work in the future.

Raja_KT Commented on SQL Server Best Practices: Monitoring Backup and Restore Progress

MS SQL products are easy , most of the time as they have GUI , IDE... and just follow the steps :)

No series yet.