Cryptography in the database : the last line of defense /
"Kevin Kenan presents a start-to-finish blueprint and execution plan for designing and building - or selecting and integrating - a complete database cryptosystem. Kenan systematically shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data even...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Upper Saddle River, NJ :
Addison Wesley,
©2006
Upper Saddle River, NJ : Addison-Wesley, [2006], ©2006 |
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | "Kevin Kenan presents a start-to-finish blueprint and execution plan for designing and building - or selecting and integrating - a complete database cryptosystem. Kenan systematically shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data even if it's been protected by strong encryption."--BOOK JACKET "Kevin Kenan presents a start-to-finish blueprint and execution plan for designing and building - or selecting and integrating - a complete database cryptosystem. Kenan systematically shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data even if it's been protected by strong encryption."--Jacket |
---|---|
Physical Description: | xxii, 277 pages : illustrations ; 24 cm |
Bibliography: | Includes bibliographical references (p. 255-256) and index Includes bibliographical references (pages 255-256) and index |
ISBN: | 0321320735 9780321320735 |