Wonder Club world wonders pyramid logo
×

Reviews for Cryptography in the Database: The Last Line of Defense

 Cryptography in the Database magazine reviews

The average rating for Cryptography in the Database: The Last Line of Defense based on 2 reviews is 4.5 stars.has a rating of 4.5 stars

Review # 1 was written on 2016-07-14 00:00:00
2005was given a rating of 5 stars Bevi Cummings
This is a good round up of the state of our privacy in the world we currently live in. Emphasis is on the British context, although with plenty of information regarding other countries - particularly Europe and North America. The book does not go into huge depth on any one issue, but does offer some practical and helpful advice. There was much I already knew in here, but occasionally there were snippets of informative information. Anyone worried about privacy in the Information age could do worse than read this book (although non British readers - your mileage will vary).
Review # 2 was written on 2008-01-30 00:00:00
2005was given a rating of 4 stars Paula Barnett
This book covers security at Many different levels (tries to be comprehensive)... although this is a constantly changing topic of study, every time new tactics are used by some hacker/virus/trojan...etc. Topic included are: the "Meaning of Computer Security", Attacks & methods of defense, cryptology, software(code) security, Viruses, root-hacks, Operating system security, Trusted-systems, File protections, Database security, SQL injection, Multi-Level approaches, Networks, firewalls, Vlans, Session hijacking, flaws in net protocols, Web site vulnerabilities, Alarms, monitoring, countermeasures, Administration, Risk Analysis, Physical building security, Data privacy, computer ethics, Email monitoring or interception, spoofing, phishing, computer crime, code of ethics, SOA Architecture, and more... This is certainly not a "light read" or something you complete in a week; but for somebody who runs computers professionally, there is a lot of info here -so you know several problem issues to avoid when designing new computer systems. I would also recommend knowing the ISO-27001 and ISO-27009 standards, and similar security standards from OWASP (Open.Web.Application.Security.Project), plus Oasis-open.org guides.


Click here to write your own review.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!