This lecture also covers authorization, including securables and permissions, users and schemas, ownership chains, assigning permissions to code. (1:24:15)Download: WMV | MP4Security EXECUTE AS and SQL InjectionOverview of EXECUTE AS, ownership chains, cross database impersonation, SQL injection, common patterns, character filtering and privileges. (41:41)Download: WMV | MP4Security Introduction a