SQL Vulnerability Evaluation now out there for SQL Server 2012 and up

SQL Vulnerability Evaluation has been out there for preview on Azure SQL Database for a few months, and has now been launched on SSMS 17.four, supporting scanning of SQL Server 2012 and up. Whether or not on-premises or on a VM!

SQL Vulnerability Evaluation

SQL Vulnerability Evaluation (VA) is your one-stop-shop to find, observe and remediate potential database vulnerabilities. It may be used as a superb preventive safety measure, offering visibility into your safety state and providing actionable steps to research, handle and resolve safety points and improve your database fortifications.

Not solely does VA expose a number of the doable safety flaws you might have in your database system, it additionally supplies remediation scripts to resolve points inside a few mouse clicks. As well as, you may settle for particular outcomes as your accredited baseline state, and the VA scan report shall be custom-made accordingly to anticipate these values.

Past bettering your database safety, VA might be a useful instrument to assist meet knowledge privateness necessities or assist adjust to knowledge safety laws just like the EU GDPR. VA simplifies the processes concerned in addressing these, and likewise amenities ongoing monitoring of your database safety standing.

What are individuals saying about Vulnerability Evaluation?

VA was designed to be easy and simple to make use of, supplying you with a easy approach to enhance your database safety stature.
Our preview prospects have been utilizing the service to lock down their database safety, and to assist tackle their knowledge privateness necessities.
Clients have been most impressed with the short and light-weight nature of the scan. They’re additionally very appreciative of the actionable remediations out there instantly throughout the VA expertise.
I personally just like the instrument, and the suggestions from different groups has been optimistic. Everybody discovered the instrument very simple to run, the findings simple to know, and fixes have been easy because of the remediation scripts.
– Anton Popov, Principal Safety Engineer at Schneider Electrical Software program, LLC

“That is one other instance of Microsoft making safety extra approachable, even in case you are not a safety knowledgeable. After operating a scan you’ll most likely see some fast wins making your database safer step-by-step.”
– Tom Kerkhove, Azure Guide at Codit and Microsoft Azure MVP

Now in SSMS

VA has now been launched as an integral a part of SQL Server Administration Studio (SSMS)! You possibly can run an evaluation from inside SSMS on any database you connect with, whether or not on-premises or within the cloud. VA helps SQL Server 2012 and up.
Working a VA scan in your SQL Server features a richer set of safety checks than the scan on Azure SQL Database, since there are extra related checks for the SQL Server floor space. When operating a scan from SSMS in your Azure SQL Database, you may anticipate the same end result to the one you see within the Azure Portal. Your baselines don’t persist throughout, although, so you’ll need to handle them individually.
To run an evaluation from SSMS, all it’s good to do is connect with your database, proper click on on the database and choose Duties -> Vulnerability Evaluation ->  Scan for Vulnerabilities… The scan takes just some seconds to run, and the outcomes are saved in your native file system, (you may configure the goal location). You’ll then see the total outcomes report within the SSMS pane, and you’ll drill down to every particular person end result for particulars and remediation steps, and to set your end result baseline.
For extra particulars on working with VA, see Getting Began with SQL Vulnerability Evaluation in SSMS.

Get began now

To get began with VA, obtain the most recent model of SSMS right here. VA is supported as of SSMS 17.four.
To be taught extra about VA, and see an evaluation in motion on Azure SQL Database, try this Channel 9 demo.
Make sure you try Getting Began with Vulnerability Evaluation for extra particulars on the right way to run and handle your evaluation.
Attempt it out and tell us what you suppose!

Compartilhar:

Introducing SQL Info Safety for Azure SQL Database and on-premises SQL Server!

We’re delighted to announce the general public preview of SQL Info Safety (Information Discovery & Classification), introducing superior capabilities constructed into Azure SQL Database for discoveringclassifyinglabeling & defending the delicate knowledge in your databases. Related capabilities are additionally being launched for on-premises SQL Server by way of SQL Server Administration Studio.
Discovering and classifying your most delicate knowledge (enterprise, monetary, healthcare, PII, and so forth.) can play a pivotal function in your organizational info safety stature. It will possibly function an infrastructure for:
  • Serving to meet knowledge privateness requirements and regulatory compliance necessities, akin to GDPR.
  • Information-centric safety situations, akin to monitoring (auditing) and alerting on anomalous entry to delicate knowledge.
  • Controlling entry to and hardening the safety of databases containing extremely delicate knowledge.

What’s SQL Info Safety?

SQL Info Safety (SQL IP) introduces a set of superior providers and new SQL capabilities, forming a brand new info safety paradigm in SQL geared toward defending the info, not simply the database:
  • Discovery & suggestions – The classification engine scans your database and identifies columns containing probably delicate knowledge. It then offers you a simple strategy to evaluate and apply the suitable classification suggestions by way of the Azure portal.
  • Labeling – Sensitivity classification labels may be persistently tagged on columns utilizing new classification metadata attributes launched into the SQL Engine. This metadata can then be utilized for superior sensitivity-based auditing and safety situations.
  • Monitoring/Auditing – Sensitivity of the question end result set is calculated in actual time and used for auditing entry to delicate knowledge (at the moment in Azure SQL DB solely).
  • Visibility – The database classification state may be considered in an in depth dashboard within the portal. Moreover, you possibly can obtain a report (in Excel format) for use for compliance & auditing functions, in addition to different wants.
Further SQL IP capabilities will proceed rolling out all through 2018 – Keep tuned!

How does SQL IP work?

We designed SQL IP with the purpose of streamlining the method of discovering -> classifying -> labeling delicate knowledge in your database atmosphere.
Our built-in automated classification engine identifies columns containing probably delicate knowledge, and offers an inventory of classification suggestions, which may be simply utilized as sensitivity metadata on high of columns, utilizing new column sensitivity attributes which have been added to the SQL engine. You can even manually classify & label your columns.

When you classify & label your knowledge, our detailed overview dashboard offers you visibility into the classification state of your database, in addition to the flexibility to export and obtain a classification report in Excel format:~

Lastly, the SQL engine makes use of the column classifications to find out the sensitivity of question end result units. Mixed with Azure SQL Database Auditing, this lets you audit the sensitivity of the particular knowledge being returned by queries:

Get began at this time!

We encourage you to check out SQL Info Safety at this time for improved visibility into your database atmosphere, in addition to for monitoring entry to your delicate knowledge.
Extra particulars on utilizing SQL Info Safety may be present in:
Compartilhar:

Enabling Confidential Computing with All the time Encrypted utilizing Enclaves (Early Entry Preview)


Final week at Ignite, we introduced a serious SQL safety funding that enhances All the time Encrypted with safe enclave applied sciences to allow:
  • Wealthy computations on encrypted columns, together with sample matching, vary comparisons, and sorting, which unlocks All the time Encrypted to a broad vary purposes and eventualities that require such computations to be carried out contained in the database system.
  • In-place encryption – schema modifications that contain cryptographic operations on delicate information, for instance: preliminary information encryption, rotating a column encryption key, or altering a knowledge kind of an encrypted column, with out migrating the info outdoors of the database for all cryptographic operations.
Our efforts to boost the performance of All the time Encrypted are a part of the just lately introduced the Azure confidential computing initiative.
Launched in 2016, All the time Encrypted makes it doable to encrypt delicate information in use to make sure the confidentiality of the info is protected against malware the machines internet hosting the database could also be contaminated with, and from high-privilege, however unauthorized customers, together with machine admins, DBAs and directors of the cloud platform internet hosting the database. Nonetheless, within the at present usually out there variations of SQL Server (2016 and 2017) and Azure SQL Database, this unparalleled stage of safety comes at a worth that’s too excessive to some prospects: performance of queries on encrypted columns will get considerably lowered, as equality comparability is the one SQL operation doable on encrypted columns (and solely with deterministic encryption). Different challenges, we hear prospects typically wrestle with right now, stem from the truth that the SQL Server Engine can not (by design) carry out any cryptographic operations on delicate information and by no means has entry to the cryptographic keys. To encrypt present information or make any schema modifications involving re-encrypting or decrypting the info, prospects want to make use of instruments, equivalent to All the time Encrypted Wizard in SSMS or the Set-SqlColumnEncryption cmdlet in PowerShell, which load the info, encrypt, decrypt or re-encrypt it and add the info again to the database. This course of can take a very long time and is vulnerable to community errors.
To deal with the above challenges, we plan to leverage cutting-edge safe enclave applied sciences, equivalent to Intel Software program Guard Extensions (SGX). An enclave is a protected area of reminiscence that acts as a trusted execution atmosphere. An enclave seems as a black field to the containing course of and to different processes working on the machine. There isn’t any technique to view the info or the code contained in the enclave from the surface, even with a debugger. Within the case of SGX, this assure is hardware-based and offered by the processor. Enclaves additionally be certain that solely approved code is permitted to run inside an enclave and entry the info. If the code is altered or tampered with, the operations are denied, and the atmosphere disabled. The enclave enforces these protections all through the execution of code inside it.
The way in which the improved All the time Encrypted characteristic makes use of enclaves is illustrated on the beneath diagram. The SQL Server Engine course of incorporates an enclave, loaded with the code implementing cryptographic algorithms, utilized in All the time Encrypted (e.g. AES-256), in addition to the code implementing SQL operations, such LIKE predicates or vary comparisons (e.g. utilizing ‘<‘ or ‘>’). Earlier than submitting a question to the SQL Server Engine for processing, the SQL consumer driver inside the appliance sends the keys, which can be required for the operations within the question, to the enclave over a safe channel. When processing queries, the SQL Server Engine delegates wealthy computations and cryptographic operations on encrypted columns to the enclave, the place the info is safely decrypted and processed. Notice that delicate information stays encrypted throughout the SQL Server Engine, when outdoors of the enclave.
Whereas the brand new structure will allow us to help a broad vary of computations on encrypted columns contained in the SQL Server Engine, we initially goal essentially the most generally requested operations, equivalent to sample matching (LIKE), vary queries, sorting (ORDER BY), in addition to a broad set of knowledge kind conversions. The beneath instance reveals a question looking out worker information based mostly on the final 4 digits of a social safety quantity (assuming the SSN column is encrypted).
DECLARE @SSNPattern CHAR(11) = '%9838'
SELECT * FROM [dbo].[Employees] WHERE [SSN] LIKE @SSNPattern
GO
Enabling cryptographic operations regionally, eliminates the necessity to transfer the info out of the database for preliminary encryption or for different encryption-related schema modifications. This significantly improves efficiency and reliability of such operations and means the operations could be triggered by way of ALTER TABLE ALTER COLUMN T-SQL statements and don’t require particular client-side instruments. Right here is an instance of an announcement that triggers a rotation of a column encryption key:

--Assuming SSN is a plaintext column, the beneath assertion encrypts information within the column.
ALTER TABLE [dbo].[Employees]
ALTER COLUMN [SSN] [char](11)
ENCRYPTED WITH (COLUMN_ENCRYPTION_KEY = [CEK1], ENCRYPTION_TYPE = Randomized, ALGORITHM = 'AEAD_AES_256_CBC_HMAC_SHA_256') NOT NULL
GO
All the time Encrypted utilizing enclaves is at present in an early entry know-how preview. When you’ve got a workload that may profit from the brand new capabilities, please join the preview at https://aka.ms/SQLEnclavesPreview and assist affect the ultimate form of this know-how in future variations of the SQL platform services and products.
To study extra and see the demos of All the time Encrypted utilizing enclaves, you’ll be able to watch the beneath recordings of Ignite classes:

Compartilhar:

Now Accessible: Information for enhancing privateness and addressing GDPR necessities with the Microsoft SQL platform


Information privateness and information safety have turn into one of the distinguished subjects in organizations in nearly each business throughout the globe. New rules are rising that formalize necessities round these subjects, and compel organizations to conform.
The upcoming EU World Information Safety Regulation (GDPR) is without doubt one of the most noteworthy of those new rules.
The GDPR takes impact on Might 25, 2018 and units a brand new international bar for privateness rights, safety, and compliance. It mandates many necessities and obligations on organizations throughout the globe. Complying with this regulation will necessitate vital investments in information dealing with and information safety for a really giant variety of organizations.
Microsoft SQL prospects who’re topic to the GDPR, whether or not managing cloud-based or on-premises databases or each, might want to make sure that qualifying information of their database methods is aptly dealt with and guarded in line with GDPR ideas. Because of this many purchasers might want to evaluate or modify their database administration and information dealing with procedures, particularly specializing in the safety of information processing as stipulated within the GDPR.
A brand new whitepaper revealed at this time offers Microsoft SQL prospects technical steering for the way to method GDPR compliance with Microsoft SQL applied sciences. It outlines a methodical, phased method to reaching compliance throughout the IT infrastructure, and particulars Microsoft SQL built-in applied sciences that may help on the information tier layer alongside the way in which.
We hope you can find this info helpful, and we affirm Microsoft’s dedication to supporting prospects of their information privateness and safety initiatives, together with compliance with the GDPR and different related directives and rules.
Obtain the SQL and GDPR whitepaper now at https://aka.ms/gdprsqlwhitepaper
For extra info on the GDPR, please go to the EU GDPR web page.
For an in-depth information on how Microsoft can assist prospects being their journey to GDPR compliance, see Starting your Normal Information Safety Regulation (GDPR) Journey.
To study extra about Microsoft’s dedication to privateness and GDPR ideas, go to the Belief Heart GDPR web site at www.microsoft.com/GDPR.
Compartilhar:

7 Places to Sell Your Used iPhone for the Highest Payout


Where would you be able to offer your cell phone for the most astounding payout? As per insights, around 90% of US residents claim a phone. Besides this, the normal life expectancy of a cell phone is around one eighteen months. After the entry of this day and age, a great many people offer their old telephone and purchase another one. In the event that you have been hoping to offer your iPhone or some other telephone for most extreme payout, read on.
1. Contraption Gobbler
Contraption Gobbler offers money for more than a thousand sorts of little devices including cell phones, tablets, amusement comforts, Media players, and cameras, just to give some examples. The organization likewise offers diverse raising support alternatives by means of the gathering of various hardware. You can get your installment from the organization within three business days as PayPal exchange or bank check.
2. Gazelle
This site is prominent for its promotion on TV and Internet. The organization offers free delivering, and you will get prepaid envelopes. In the event that all goes well, you will get paid that day. The installment choices offered by the organization incorporate PayPal, Bank check, Amazon gift voucher and numerous others.
3. uSell
uSell is a commercial center where you can connect with a ton of potential purchasers. What you have to do is set a value that may work for you. And after that, you need to hold up the organization to send you a prepaid envelope. The installment will be made through PayPal or money. Furthermore, you will get the installment within 5 business days.
4. eBay Instant Sale
eBay is another huge name on the off chance that you need to offer your telephone. Its usefulness is like that of Gazelle, however, the administration is perplexing with 4 quality levels for your telephone.
5. Amazon Electronics Trade-In
On the rundown of enormous online stores, Amazon has the principal position. Amazon is well known for its exchange projects and gift vouchers. Like eBay, the store offers free dispatching. Be that as it may, the bundling expense will be on you.
6. Craigslist
Craigslist is extraordinary compared to other decisions in the event that you would prefer not to pay any charge. The interface of the site is great, yet it is extraordinary compared to other spots for offering your telephone through. Nonetheless, with CL, you should meet the potential purchasers face to face. We propose that you be watchful and pick a bustling spot to connect with the buyer. You should simply set the cost and afterward sit tight for the purchaser to get in touch with you.
7. Nearby electronic stores
In the event that you would prefer not to offer on the web, you can simply ahead and search for a neighborhood store. The larger part of gadgets retailers offers buyback programs for utilized hardware. The installment will be made in real money or through store credit. On the off chance that you are searching for a helpful method for offering your telephone, we recommend that you choose a neighborhood store.
Along these lines, on the off chance that you have been hoping to offer your telephone for greatest payout, we recommend that you look at the 7 places portrayed.
Compartilhar:

Things to Consider While Designing a Mobile Application for Your Business


Regardless of whether it is for social occasion client subtle elements or to refresh the procedures of your business, a very much created application can obviously be an incredible device for your business. Numerous organizations have a versatile application in their plan for the day. Be that as it may, having a vital one conveys the significance. To enable you to build up the best application for your business, here are a couple of things you can consider while building up an application for your business.
1. Be watchful in designating the designer or seller
Try to locate the best designer or a portable application advancement merchant. Since each designer you would go over may not be the best for your business. Consequently, crosscheck his portfolio and take the choice before the pickup.
2. Deal with the financial plan
You ought to be extremely savvy on burning through cash on your application. Since separating from creating cost, there are different costs like support cost, refreshing expense and so on.
3. Application ought not to be perplexing
Your application ought to be extremely easy to use. Ensure the client does not get mistaken for plenty of highlights added to your application. Once the client enters your application, he should recognize what the application is for.
4. Be interested in inputs
Nothing is great. Subsequently, there will dependably be space for the defect. So best thought is to get criticisms from the clients who have been as of now utilizing your application. Investigation programming will help you in getting the information about suppositions of the clients of your application.
5. Redesign your application well ordered
Try not to attempt to make the most developed portable application at one time. Rather, influence utilization of the refreshing to process and continue refreshing the fundamental application to its propelled shape well ordered. When you give your clients to encounter more up to date advancements in the application and guarantees them that your organization dependably stay refreshed.
6. Keep refresh of the market
Before arranging your application, realize what is as of now introduce in the market. Today in all stages, a wide range of applications areas of now out. So before beginning the portable application improvement, ensure the possibility of your application is another one.
Like any innovation, versatile tech continues refreshing thus should you? Alongside it, there will be different decisions to achieve your objective. On the off chance that your group of onlookers incorporates expansive size of clients, go for HTML. In the event that it is for particular individuals, utilize the innovation that suits that scale the best. Along these lines remember every one of the highlights you have to take mind before building up any application. Simply deal with these easily overlooked details and put it all on the line.
Compartilhar:

JOINS VERSUS SUBQUERIES SQL PUZZLE

In this puzzle, we’re going to learn about joins versus subqueries.  In many queries you can substitute joins and subqueries.  Yet, since each has their strengths, it isn’t wise to do so.  Once you have worked through this puzzle you see some of the benefits and disadvantages of joins versus subqueries.
Solving puzzles is a great way to learn SQL.  Nothing beats practicing what you’ve learned.  Once you have figured out the puzzle, post you answer in the comments so we all can learn from one another.  We also discuss puzzle and more in Essential SQL Learning Group on Facebook.  Be sure to find us there!

SQL Puzzle Question – Joins versus Subqueries

The system admin would like a report of active users.  Can you write a report that returns the name, phone number and most recent date for any user that has logged in the 30 days since March14th, 2017?
(you can tell a user has logged in if the action field in UserHistory is set to “Logged On”).
User
UserHistory
Every time a user logs in a new row is inserted into the UserHistory table with userID, current date and action (where action = “Logged On”).
Question #1 – Write a SQL query without using Subqueries.
Question #2 – Write the SQL using subqueries.
As you answer the questions think about the differences of  joins versus subqueries.  Which technique is better suited to solve the problem?  Can you see advantages to either case?
To get you started, download this script which contains the table definitions and some test data.

Answer to Question #1 – INNER JOIN

Like most queries I write, I took this one step by step.  Let me show you what I mean by walking you through my thought process.
Regardless of how this query turned out, I knew I would have to figure out how to get the logins 30 days since 2017-03-14.  To do this I wrote a simple query that used the DATEDIFF function to calculate the number of days from the actionDate to the 14th.  If the days were less than or equal to 30, I knew the entry was within the window.
SELECT *,
DATEDIFF(DAY, actionDate, '2017-03-14')
FROM   @UserHistory
WHERE  action = 'Logged On'
AND DATEDIFF(DAY, actionDate, '2017-03-14') <= 30;
You’ll see that I included the result of the DATEDIFF in query result.  I didn’t this because I always get the parameter mixed up!  By displaying the result, I could verify that I had the formula correct; therefore, being used in my WHERE clause as expected.
Here are is what I saw:
Joins versus Subqueries - DATEDIFF result
Now that I knew I could get actionDate within the window, I proceeded to join the UserHistory with User so I could include the PhoneNumber in my results. I joined the tables by userID.
SELECT U.Name,
U.PhoneNumber,
UH.actionDate AS RecentLogonDate
FROM   @User AS U
INNER JOIN @UserHistory AS UH
ON U.userID = UH.userID
WHERE  action = 'Logged On'
AND DATEDIFF(DAY, actionDate, '2017-03-14') <= 30;
Given there are several UserHistory entries per user, I would expect to see duplicates.  I’ve highlighted some of those below:
Joins versus Subqueries - Duplicate Entries Due to Join
The last task which remains is to only show the most recent login date for each user.  For Bob, this would be 2017-03-02.
Notice, that for each user, the most recent date is the maxim date for that user.  This is a big hint, as it points us towards using aggregate functions such as MAX.
Joins versus Subqueries - GROUBYBY hint
So, at this point we can use GROUP BY to calculation the maximum date for each user.
SELECT   U.Name,
U.PhoneNumber,
MAX(UH.actionDate) AS RecentLogonDate
FROM     @User AS U
INNER JOIN @UserHistory AS UH
ON U.userID = UH.userID
WHERE    action = 'Logged On'
AND DATEDIFF(DAY, actionDate, '2017-03-14') <= 30
GROUP BY U.Name, U.phoneNumber;
Whose result is
Joins versus Subqueries - Final INNER JOIN Result
There are a couple of takeaways from this:
  • First, here is no shame is doing a query to get intermediate results. When using formulas, such as DATEDIFF, make sure you’re getting the calculation you expect.
  • Second, it can take more than one technique to solve a problem. In our case we had first join the items, and once we had the result use GROUP BY to get the most recent date.
  • Last, keep it simple! At first I thought I would have to do another join so I could compare dates, but I realized that was going to get complicated.  Also, I figured I could partition the data and use a window function, but that seemed like overkill.  Once I realized I simply had to calculate the MAX, I realized GROUP BY would work.
I’m sure there are other ways to solve this puzzle.  So, what answer did you get?   Please share in the comments.

Answer to Question #2 – Subquery

Let’s look at the second piece of the puzzle when it comes to joins versus subqueries; the subquery.
This query is elegant in that IN operator naturally remove duplicates, but gets ugly as another sub query is needed to pull in the most recent date.
What you’ll see is that subqueries are really great when you need to return rows from one table based on the existence of one or more conditions in another, but not so swift at combining data from one table with another.
To show you what I mean, check out this query which shows the user and phone number for an actionDate within the windows:
SELECT U.Name,
U.PhoneNumber
FROM   @User AS U
WHERE  U.UserID IN (SELECT UserID
FROM   @UserHistory
WHERE  action = 'Logged On'
AND DATEDIFF(DAY, actionDate, '2017-03-14') <= 30);
In this case the we naturally get a unique list of name and phone numbers as we are listing users.
The uniqueness is guaranteed by the fact the table naturally contains unique value (yes, I know I didn’t define a Primary Key on the table, but hopefully you see it could be one).
The subquery in the WHERE clause compiles a list of userID’s whose actionDate falls within the 30-day window.
Joins versus Subqueries - Subquery but no ActionDate
Of course, our query is only partially written, as it doesn’t display the latest actionDate.
If I could dream  a bit (the dreamy bits are in blue) I would love to be able to write a query like:
SELECT U.Name,
U.PhoneNumber,
(SELECT Max(UH.actionDate)
FROM   @UserHistory AS UH
WHERE  action = 'Logged On'
AND DATEDIFF(DAY, actionDate, '2017-03-14') <= 30
AND U.userID = UH.userID) AS RecentLogonDate
FROM   @User AS U
WHERE  DATEDIFF(DAY, RecentLogonDate, '2017-03-14') <= 30
AND RecentLogonDate IS NOT NULL
But this isn’t a properly written query, and SQL gets mad!
Msg 207, Level 16, State 1, Line 62
Invalid column name 'RecentLogonDate'.
Msg 207, Level 16, State 1, Line 63
Invalid column name 'RecentLogonDate'.
What makes our subquery ugly is being forced to use two subqueries to retrieve the most recent actionDate.  To do this you must essentially repeat the query, but now as a correlated sub query.  The correlation is show in red.  It just the match of the User table UserID to that in UserHistory.
SELECT U.Name,
U.PhoneNumber,
(SELECT Max(UH.actionDate)
FROM   @UserHistory AS UH
WHERE  action = 'Logged On'
AND DATEDIFF(DAY, actionDate, '2017-03-14') <= 30
AND U.userID = UH.userID) AS RecentLogonDate
FROM   @User AS U
WHERE  U.UserID IN (SELECT UserID
FROM   @UserHistory
WHERE  action = 'Logged On'
AND DATEDIFF(DAY, actionDate, '2017-03-14') <= 30);

Conclusion

Now that you’ve seen the differences of joins versus subqueries I’m hoping you have a better understanding on when to use one versus the other.  To summarize,  joins excel at combining data from two tables, subqueries are best when testing for the existence of a value from one table found in another.
What are your experiences with joins versus subqueries?  Which do you prefer to use when?  Please share in the comments!
Compartilhar:
Proxima  → Página inicial

Postagens mais visitadas

ADS