Text
Cryptography in the database: the last line of defense
Contents:
Part I Database security
1 The case for database security
2 Securing database with cryptography
Part II A cryptographic infrastructure
3 An overview of cryptographic infrastructure
4 Cryptographic engines and algorithms
5 Keys: vaults, manifests, and managers
6 Cryptographic providers and consumers
Part II The cryptographic project
7 Managing the cryptographic project
8 Requirements hardening
9 Design hardening
10 Secure development
11 Testing
12 Deployment, defense, and decommissioning
Part IV Example code
13 About the examples
14 A key vault
15 The manifest
16 The key manager
17 The engine
18 Receipts and the provider
19 The consumer
20 Exceptions
21 The system at work
No other version available