Sold Out
Book Categories |
1 | The case for database security | 3 |
2 | Securing databases with cryptography | 17 |
3 | An overview of cryptographic infrastructure | 37 |
4 | Cryptographic engines and algorithms | 57 |
5 | Keys : vaults, manifests, and managers | 71 |
6 | Cryptographic providers and consumers | 85 |
7 | Managing the cryptographic project | 95 |
8 | Requirements hardening | 103 |
9 | Design hardening | 117 |
10 | Secure development | 133 |
11 | Testing | 141 |
12 | Deployment, defense, and decommissioning | 151 |
13 | About the examples | 159 |
14 | A key vault | 165 |
15 | The manifest | 183 |
16 | The key manager | 195 |
17 | The engine | 209 |
18 | Receipts and the provider | 213 |
19 | The consumer | 221 |
20 | Exceptions | 241 |
21 | The system at work | 245 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionCryptography in the Database: The Last Line of Defense
X
This Item is in Your InventoryCryptography in the Database: The Last Line of Defense
X
You must be logged in to review the productsX
X
X
Add Cryptography in the Database: The Last Line of Defense, Protect Your Enterprise Data with Rock-Solid Database Encryption If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now, Cryptography in the Database: The Last Line of Defense to the inventory that you are selling on WonderClubX
X
Add Cryptography in the Database: The Last Line of Defense, Protect Your Enterprise Data with Rock-Solid Database Encryption If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now, Cryptography in the Database: The Last Line of Defense to your collection on WonderClub |