Book details of 'Cryptography in the Database : The Last Line of Defense'
Shop for this book
As an Amazon Associate I earn from qualifying purchases
Back to shelf Privacy
The Virtual Bookcase Reviews of 'Cryptography in the Database : The Last Line of Defense':
Reviewer Rob Slade wrote:
The preface states that the intended reader is the technical lead for
the protection of information in a database. This person should be
well familiar with databases, and have a passing knowledge of
Part one deals with database security. Chapter one states that
databases are important, and we should protect them. A brief review
of database concepts (limited to relational databases) and a rather
longer, and quite complete, overview of cryptography, is in chapter
Part two outlines a cryptographic infrastructure. Chapter three
examines keys and key management. Algorithms, and symmetric block
algorithm modes, are covered in chapter four. More of key management
is addressed in chapter five. Chapter six looks at the logical
(rather than programming) interfaces between encryption, decryption,
and the application.
Part three reviews the overall cryptographic project. Chapter seven
discusses project management. Ways of specifying security aspects of
the system are suggested in chapter eight, while nine examines design.
Some general principles for secure implementation are listed in
chapter ten. Various types of testing are reviewed in chapter eleven.
Chapter twelve looks at the deployment, monitoring, and removal of an
Part four contains sample Java code. There is an explanation of the
code, and then a key vault, manifest, manager, engine, cryptographic
service provider, client, exception handling code, and a run of the
system in operation.
Rather than an actual text on the special needs of databases for
cryptography, this is more like a general review of cryptographic
concepts with some attention paid to examples that would deal with
certain database issues. The material is sound enough, as far as it
goes. But those who maintain large databases and wish to see
practical solutions for the problems they face may be disappointed.
copyright Robert M. Slade, 2005
Add my review for Cryptography in the Database : The Last Line of Defense