Security checklist for an SQLInformation technology / By Brian Leakey Using the Internet as a resource, develop a security checklist for an SQL Server.