Cryptography in the Database The Last Line of Defense

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

In this book, a leading crypto expert at Symantec demonstrates exactly how to use encryption with your own enterprise databases and applications.               

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • Database training
  • Database
  • Security
  • IT Security

Course programme

Description
In this book, a leading crypto expert at Symantec demonstrates exactly how to use encryption with your own enterprise databases and applications.

Program

Protect Your Enterprise Data with Rock-Solid Database Encryption
If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure-from your customers, your partners, your stockholders, and now, the government-to keep your data secure. But what if hackers evade your sophisticated security mechanisms? When all else fails, you have one last powerful line of defense: database cryptography. In this book, a leading crypto expert at Symantec demonstrates exactly how to use encryption with your own enterprise databases and applications.


Kevin Kenan presents a start-to-finish blueprint and execution plan for designing and building-or selecting and integrating-a complete database cryptosystem. Kenan systematically shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data even if it's been protected by strong encryption.


This book's 3,000 lines of downloadable code examples let you explore every component of a live database cryptosystem, including key vaults and managers, manifests, engines, and providers.


This book's coverage includes:
  • Understanding your legal obligations to protect data
  • Constructing a realistic database security threat model and ensuring that you address critical threats
  • Designing robust database cryptographic infrastructure around today's most effective security patterns
  • Hardening your database security requirements
  • Classifying the sensitivity of your data
  • Writing database applications that interact securely with your cryptosystem
  • Avoiding the common vulnerabilities that compromise database applications
  • Managing cryptographic projects in your enterprise database environment
  • Testing, deploying, defending, and decommissioning secure database applications
Cryptography in the Database is an indispensable resource for every professional who must protect enterprise data: database architects, administrators, and developers; system and security analysts; and many others.



Author: Kevin Kenan
Publisher: Addison-Wesley Professional
ISBN 10: 0321320735
ISBN 13: 9780321320735
Pages: 312
Format: Soft Cover
Published Date: Oct 2005
Availability: Ex Stock


Cryptography in the Database The Last Line of Defense

Price on request