Title rated 0 out of 5 stars, based on 0 ratings(0 ratings)
Book, 2006
Current format, Book, 2006, , All copies in use.
Book, 2006
Current format, Book, 2006, , All copies in use. Offered in 0 more formats
Demonstrates how to use encryption with your own enterprise databases and applications. The author presents a blueprint and execution plan for designing and building - or selecting and integrating - a complete database cryptosystem. He shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data.
From the community