Author: Kevin Kenan
Edition: 1
Binding: Paperback
ISBN: 0321320735
Publisher: Addison-Wesley Professional
Features:
Edition: 1
Binding: Paperback
ISBN: 0321320735
Publisher: Addison-Wesley Professional
Features:
Cryptography in the Database: The Last Line of Defense
Protect Your Enterprise Data with Rock-Solid Database Encryption. Search and download computer ebooks Cryptography in the Database: The Last Line of Defense for free.
Categories: Cryptography, Database security. Contributors: Kevin Kenan - Author. Format: Paperback. Download Cryptography in the Database computer ebooks
If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure-from your customers, your partners, your stockholders, and now, the government-to keep your data secure. But what if hackers evade your sophisticated security mechanisms? When all else fails, you have one last powerful line of defense: database cryptography. In this book, a leading crypto expert at Symantec demonstrates exactly how to use encryption with your own enterprise databases and applications. Kevin Kenan presents a start-to-finish blueprint and execution plan for designing and building-or selecting and integrating-a complete database cryptosystem. Kenan
Cryptography In The Database
Categories: Cryptography, Database security. Contributors: Kevin Kenan - Author. Format: Paperback
Database encryption is a sleeper security topic that is poised to explode in the very near future. This book shows readers how to use encryption to create the last line of defense against data threats. *Author: Kenan, Kevin *Binding Type: Paperback *Number of Pages: 277 *Publication Date: 2005/10/01 *Language: English *Dimensions: 9.22 x 7.06 x 0.77 inches
Pearson Education (Us) | 2005 | 312 pages | ISBN-13: 9780321320735 | ISBN-10: 0321320735 | You save 15%
Demonstrating how cryptography can be used to secure a corporate database, a practical handbook for security specialists and technical personnel explains how to idenify security risks; reveals the procedures for encrypting data to prevent loss, theft, or compromise of sensitive information; and details how to test, update, and manage a system. Original. (Intermediate)
Cryptography in the Database Free
If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure-from your customers, your partners, your stockholders, and now, the government-to keep your data secure. But what if hackers evade your sophisticated security mechanisms? When all else fails, you have one last powerful line of defense: database cryptography. In this book, a leading crypto expert at Symantec demonstrates exactly how to use encryption with your own enterprise databases and applications
Kenan