June 16th, 2025
Home | Log in!

On Top Shelf
BONDED IN DEATHBONDED IN DEATH
Fresh Pick
THE POTTING SHED MURDER
THE POTTING SHED MURDER

New Books This Week

Reader Games

Reviewer Application


Sunshine, secrets, and swoon-worthy stories—June's featured reads are your perfect summer escape.

Slideshow image


Since your web browser does not support JavaScript, here is a non-JavaScript version of the image slideshow:

slideshow image
He doesn�t need a woman in his life; she knows he can�t live without her.


slideshow image
A promise rekindled. A secret revealed. A second chance at the family they never had.


slideshow image
A cowboy with a second chance. A waitress with a hidden gift. And a small town where love paints a brand-new beginning.


slideshow image
She�s racing for a prize. He�s dodging romance. Together, they might just cross the finish line to love.


slideshow image
She steals from the mob for justice. He�s the FBI agent who could take her down�or fall for her instead.


slideshow image

He�s her only protection. She�s carrying his child. Together, they must outwit a killer before time runs out.


Translucent Databases by Peter Wayner

Purchase

Add to Wish List


Also by Peter Wayner:

Translucent Databases, April 2002
Trade Size

Translucent Databases
Peter Wayner

An invaluble manual to build privacy in databases

UNKNOWN
April 2002
193 pages
ISBN: 0967584418
Trade Size
Add to Wish List

Non-Fiction

Do you have personal information in your database?

Do you keep files on your customers, your employees, or anyone else?

Do you need to worry about European laws restricting the information you keep?

Do you keep copies of credit card numbers, social security numbers, or other information that might be useful to identity thieves or insurance fraudsters?

Do you deal with medical records or personal secrets?

Most database administrators have some of these worries. Some have all of them. That's why database security is so important.

This new book, Translucent Databases, describes a different attitude toward protecting the information. Most databases provide elaborate control mechanisms for letting the right people in to see the right records. These tools are well-designed and thoroughly tested, but they can only provide so much support. If someone breaks into the operating system itself, all of the data on the hard disk is unveiled. If a clerk, a supervisor, or a system administrator decides to turn traitor, there's nothing anyone can do.

Translucent databases provide better, deeper protection by scrambling the data with encryption algorithms. The solutions use the minimal amount of encryption to ensure that the database is still functional. In the best applications, the personal and sensitive information is protected but the database still delivers the information.

Comments

No comments posted.

Registered users may leave comments.
Log in or register now!

© 2003-2025 off-the-edge.net  all rights reserved Privacy Policy