Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Cryptography in the Database
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Cryptography in the Database

Cryptography in the Database

The Last Line of Defense

Kevin Kenan

280 pages, parution le 21/12/2005

Résumé

Protect Your Enterprise Data with Rock-Solid Database Encryption

If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure-from your customers, your partners, your stockholders, and now, the government-to keep your data secure. But what if hackers evade your sophisticated security mechanisms? When all else fails, you have one last powerful line of defense: database cryptography. In this book, a leading crypto expert at Symantec demonstrates exactly how to use encryption with your own enterprise databases and applications.

Kevin Kenan presents a start-to-finish blueprint and execution plan for designing and building-or selecting and integrating-a complete database cryptosystem. Kenan systematically shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data even if it's been protected by strong encryption.

This book's 3,000 lines of downloadable code examples let you explore every component of a live database cryptosystem, including key vaults and managers, manifests, engines, and providers.

This book's coverage includes

  • Understanding your legal obligations to protect data
  • Constructing a realistic database security threat model and ensuring that you address critical threats
  • Designing robust database cryptographic infrastructure around today's most effective security patterns
  • Hardening your database security requirements
  • Classifying the sensitivity of your data
  • Writing database applications that interact securely with your cryptosystem
  • Avoiding the common vulnerabilities that compromise database applications
  • Managing cryptographic projects in your enterprise database environment
  • Testing, deploying, defending, and decommissioning secure database applications

Cryptography in the Database is an indispensable resource for every professional who must protect enterprise data: database architects, administrators, and developers; system and security analysts; and many others.

Sommaire

  • Database Security
    • The Case for Database Security
    • Securing Databases with Cryptography
  • A Cryptographic Infrastructure
    • An Overview of Cryptographic Infrastructure
    • Cryptographic Engines and Algorithms
    • Keys: Vaults, Manifests, and Managers
    • Cryptographic Providers and Consumers
  • The Cryptographic Project
    • Managing the Cryptographic Project
    • Requirements Hardening
    • Design Hardening
    • Secure Development
    • Testing
    • Deployment, Defense, and Decommissioning
  • Example Code
    • About the Examples
    • A Key Vault
    • The Manifest
    • The Key Manager
    • The Engine
    • Receipts and Provider
    • The Consumer
    • Exceptions
    • The System at Work
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Addison Wesley
Auteur(s) Kevin Kenan
Parution 21/12/2005
Nb. de pages 280
Format 17,5 x 23,5
Couverture Broché
Poids 610g
Intérieur Noir et Blanc
EAN13 9780321320735
ISBN13 978-0-321-32073-5

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav.client@eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription