Cryptography in the Database
The Last Line of DefenseBook - 2006
Demonstrates how to use encryption with your own enterprise databases and applications. The author presents a blueprint and execution plan for designing and building - or selecting and integrating - a complete database cryptosystem. He shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data.
Publisher: Upper Saddle River, NJ : Addison Wesley, c2006
Branch Call Number: 005.8 K33c
Characteristics: xxii, 277 p. : ill. ; 24 cm