Cryptography in the Database: The Last Line of Defense

Author:   Kevin Kenan
Publisher:   Pearson Education (US)
ISBN:  

9780321320735


Pages:   312
Publication Date:   27 October 2005
Format:   Paperback
Availability:   Out of print, replaced by POD   Availability explained
We will order this item for you from a manufatured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Cryptography in the Database: The Last Line of Defense


Add your own review!

Overview

Protect Your Enterprise Data with Rock-Solid Database Encryption If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure--from your customers, your partners, your stockholders, and now, the government--to keep your data secure. But what if hackers evade your sophisticated security mechanisms? When all else fails, you have one last powerful line of defense: database cryptography. In this book, a leading crypto expert at Symantec demonstrates exactly how to use encryption with your own enterprise databases and applications. Kevin Kenan presents a start-to-finish blueprint and execution plan for designing and building--or selecting and integrating--a complete database cryptosystem. Kenan systematically shows how to eliminate weaknesses, overcome pitfalls, and defend against attacks that can compromise data even if it's been protected by strong encryption. This book's 3,000 lines of downloadable code examples let you explore every component of a live database cryptosystem, including key vaults and managers, manifests, engines, and providers.This book's coverage includes * Understanding your legal obligations to protect data * Constructing a realistic database security threat model and ensuring that you address critical threats * Designing robust database cryptographic infrastructure around today's most effective security patterns * Hardening your database security requirements * Classifying the sensitivity of your data * Writing database applications that interact securely with your cryptosystem * Avoiding the common vulnerabilities that compromise database applications * Managing cryptographic projects in your enterprise database environment * Testing, deploying, defending, and decommissioning secure database applications Cryptography in the Database is an indispensable resource for every professional who must protect enterprise data: database architects, administrators, and developers; system and security analysts; and many others. A(c) Copyright Pearson Education. All rights reserved.

Full Product Details

Author:   Kevin Kenan
Publisher:   Pearson Education (US)
Imprint:   Addison-Wesley Educational Publishers Inc
Dimensions:   Width: 17.90cm , Height: 2.00cm , Length: 23.40cm
Weight:   0.606kg
ISBN:  

9780321320735


ISBN 10:   0321320735
Pages:   312
Publication Date:   27 October 2005
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   Out of print, replaced by POD   Availability explained
We will order this item for you from a manufatured on demand supplier.

Table of Contents

Acknowledgments. About the Author. Preface. I. DATABASE SECURITY. 1: The Case for Database Security. 2: Securing Databases with Cryptography. II. A CRYPTOGRAPHIC INFRASTRUCTURE. 3. An Overview of Cryptographic Infrastructure. 4. Cryptographic Engines and Algorithms. 5. Keys: Vaults, Manifests, and Managers. 6. Cryptographic Providers and Consumers. III. THE CRYPTOGRAPHIC PROJECT. 7. Managing the Cryptographic Project. 8. Requirements Hardening. 9. Design Hardening. 10. Secure Development. 11. Testing. 12. Deployment, Defense, and Decommissioning. IV. EXAMPLE CODE. 13. About the Examples. 14. A Key Vault. 15. The Manifest. 16. The Key Manager. 17. The Engine. 18. Receipts and Provider. 19. The Consumer. 20. Exceptions. 21. The System at Work. Bibliography. Glossary. Index.

Reviews

Author Information

Kevin Kenan leads Symantec's IT application and database security program. In this position, he works with application development teams to ensure that the applications and databases Symantec deploys internally are secure. This work includes specifying cryptographic solutions to protect sensitive information wherever it is stored. Prior to his work in Symantec's information security department, Kevin designed and developed applications for Symantec's information technology and product development teams often with an emphasis on security and cryptography. He previously provided enterprise support for Symantec's development tools, and he holds a Bachelor of Science in Mathematics from the University of Oregon.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List