The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

Book details of 'Cryptography in the Database : The Last Line of Defense'

Cover of Cryptography in the Database : The Last Line of Defense
TitleCryptography in the Database : The Last Line of Defense
Author(s)Kevin Kenan
ISBN0321320735
LanguageEnglish
PublishedOctober 2005
PublisherAddison-Wesley Professional
Web links for this book
Search at Bookcrossing.com
Wikipedia booksources
Shop for this book
At Amazon.com
At Amazon.co.uk

Back to shelf Privacy
Amazon.com info for Cryptography in the Database : The Last Line of Defense

Score:

Vote for this book

The Virtual Bookcase Reviews of 'Cryptography in the Database : The Last Line of Defense':

Reviewer Rob Slade wrote:
The preface states that the intended reader is the technical lead for the protection of information in a database. This person should be well familiar with databases, and have a passing knowledge of cryptography. Part one deals with database security. Chapter one states that databases are important, and we should protect them. A brief review of database concepts (limited to relational databases) and a rather longer, and quite complete, overview of cryptography, is in chapter two. Part two outlines a cryptographic infrastructure. Chapter three examines keys and key management. Algorithms, and symmetric block algorithm modes, are covered in chapter four. More of key management is addressed in chapter five. Chapter six looks at the logical (rather than programming) interfaces between encryption, decryption, and the application. Part three reviews the overall cryptographic project. Chapter seven discusses project management. Ways of specifying security aspects of the system are suggested in chapter eight, while nine examines design. Some general principles for secure implementation are listed in chapter ten. Various types of testing are reviewed in chapter eleven. Chapter twelve looks at the deployment, monitoring, and removal of an application. Part four contains sample Java code. There is an explanation of the code, and then a key vault, manifest, manager, engine, cryptographic service provider, client, exception handling code, and a run of the system in operation. Rather than an actual text on the special needs of databases for cryptography, this is more like a general review of cryptographic concepts with some attention paid to examples that would deal with certain database issues. The material is sound enough, as far as it goes. But those who maintain large databases and wish to see practical solutions for the problems they face may be disappointed. copyright Robert M. Slade, 2005
Add my review for Cryptography in the Database : The Last Line of Defense
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2017 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement