April 27th, 2024
Home | Log in!

On Top Shelf
EXPLOSIVE TRAILEXPLOSIVE TRAIL
Fresh Pick
AT THE EDGE OF THE WOODS
AT THE EDGE OF THE WOODS

New Books This Week

Fresh Fiction Box

Video Book Club

Latest Articles


April's Affections and Intrigues: Love and Mystery Bloom

Slideshow image


Since your web browser does not support JavaScript, here is a non-JavaScript version of the image slideshow:

slideshow image
Investigating a conspiracy really wasn't on Nikki's very long to-do list.


slideshow image
Escape to the Scottish Highlands in this enemies to lovers romance!


slideshow image
It�s not the heat�it�s the pixie dust.


slideshow image
They have a perfect partnership�
But an attempt on her life changes everything.


slideshow image
Jealousy, Love, and Murder: The Ancient Games Turn Deadly


slideshow image
Secret Identity, Small Town Romance
Available 4.15.24


Translucent Databases by Peter Wayner

Purchase

Add to Wish List


Also by Peter Wayner:

Translucent Databases, April 2002
Trade Size

Translucent Databases
Peter Wayner

An invaluble manual to build privacy in databases

UNKNOWN
April 2002
193 pages
ISBN: 0967584418
Trade Size
Add to Wish List

Non-Fiction

Do you have personal information in your database?

Do you keep files on your customers, your employees, or anyone else?

Do you need to worry about European laws restricting the information you keep?

Do you keep copies of credit card numbers, social security numbers, or other information that might be useful to identity thieves or insurance fraudsters?

Do you deal with medical records or personal secrets?

Most database administrators have some of these worries. Some have all of them. That's why database security is so important.

This new book, Translucent Databases, describes a different attitude toward protecting the information. Most databases provide elaborate control mechanisms for letting the right people in to see the right records. These tools are well-designed and thoroughly tested, but they can only provide so much support. If someone breaks into the operating system itself, all of the data on the hard disk is unveiled. If a clerk, a supervisor, or a system administrator decides to turn traitor, there's nothing anyone can do.

Translucent databases provide better, deeper protection by scrambling the data with encryption algorithms. The solutions use the minimal amount of encryption to ensure that the database is still functional. In the best applications, the personal and sensitive information is protected but the database still delivers the information.

Comments

No comments posted.

Registered users may leave comments.
Log in or register now!

© 2003-2024 off-the-edge.net  all rights reserved Privacy Policy