Wonder Club world wonders pyramid logo
×

Cryptography in the Database: The Last Line of Defense Book

Cryptography in the Database: The Last Line of Defense
Cryptography in the Database: The Last Line of Defense, Protect Your Enterprise Data with Rock-Solid Database Encryption
If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now, Cryptography in the Database: The Last Line of Defense has a rating of 4.5 stars
   2 Ratings
X
Cryptography in the Database: The Last Line of Defense, Protect Your Enterprise Data with Rock-Solid Database Encryption If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now, Cryptography in the Database: The Last Line of Defense
4.5 out of 5 stars based on 2 reviews
5
50 %
4
50 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Cryptography in the Database: The Last Line of Defense
  • Written by author Kevin Kenan
  • Published by Addison-Wesley, October 2005
  • Protect Your Enterprise Data with Rock-Solid Database Encryption If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now
  • Kenan, a crypto expert who leads Symantec's IT application and database security program, discusses types of attacks on databases, encryption methods, and legal obligations to protect customer data, then describes cryptographic keys and well-tested public
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

1The case for database security3
2Securing databases with cryptography17
3An overview of cryptographic infrastructure37
4Cryptographic engines and algorithms57
5Keys : vaults, manifests, and managers71
6Cryptographic providers and consumers85
7Managing the cryptographic project95
8Requirements hardening103
9Design hardening117
10Secure development133
11Testing141
12Deployment, defense, and decommissioning151
13About the examples159
14A key vault165
15The manifest183
16The key manager195
17The engine209
18Receipts and the provider213
19The consumer221
20Exceptions241
21The system at work245


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Cryptography in the Database: The Last Line of Defense, Protect Your Enterprise Data with Rock-Solid Database Encryption
If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now, Cryptography in the Database: The Last Line of Defense

X
WonderClub Home

This item is in your Collection

Cryptography in the Database: The Last Line of Defense, Protect Your Enterprise Data with Rock-Solid Database Encryption
If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now, Cryptography in the Database: The Last Line of Defense

Cryptography in the Database: The Last Line of Defense

X
WonderClub Home

This Item is in Your Inventory

Cryptography in the Database: The Last Line of Defense, Protect Your Enterprise Data with Rock-Solid Database Encryption
If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now, Cryptography in the Database: The Last Line of Defense

Cryptography in the Database: The Last Line of Defense

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: