Cryptography in the Database

Cryptography in the Database

The Last Line of Defense

Book - 2006
Rate this:
Demonstrates how to use encryption with your own enterprise databases and applications. The author presents a blueprint and execution plan for designing and building - or selecting and integrating - a complete database cryptosystem. He shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data.
Publisher: Upper Saddle River, NJ : Addison Wesley, c2006
ISBN: 9780321320735
Branch Call Number: 005.8 K33c
Characteristics: xxii, 277 p. : ill. ; 24 cm

Related Resources


From the critics

Community Activity


Add a Comment

There are no comments for this title yet.

Age Suitability

Add Age Suitability

There are no age suitabilities for this title yet.


Add a Summary

There are no summaries for this title yet.


Add Notices

There are no notices for this title yet.


Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Subject Headings


Find it at VPL

To Top