Cryptography In The Database. (Record no. 25584)

MARC details
000 -LEADER
fixed length control field 04351nam a22003253i 4500
001 - CONTROL NUMBER
control field EBC5126416
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190105113655.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s2005 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131741382
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5126416
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5126416
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL265203
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1024276263
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 005.82
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kenan, Kevin.
245 10 - TITLE STATEMENT
Title Cryptography In The Database.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (305 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note COVER -- CONTENTS -- ACKNOWLEDGMENTS -- ABOUT THE AUTHOR -- PREFACE -- PART I: Database Security -- 1 THE CASE FOR DATABASE SECURITY -- 1.1 Attacks Against Databases -- 1.2 External Requirements to Secure Databases -- 1.3 Summary -- 2 SECURING DATABASES WITH CRYPTOGRAPHY -- 2.1 A Brief Database Refresher -- 2.2 What Is Cryptography? -- 2.3 Applying Cryptography -- 2.4 Cryptographic Risks -- 2.5 Cryptographic Attacks -- 2.6 Obfuscation -- 2.7 Transparent Encryption -- 2.8 Summary -- PART II: A Cryptographic Infrastructure -- 3 AN OVERVIEW OF CRYPTOGRAPHIC INFRASTRUCTURE -- 3.1 Application Architecture -- 3.2 Cryptographic Architecture -- 3.3 Cryptographic Keys -- 3.4 Summary -- 4 CRYPTOGRAPHIC ENGINES AND ALGORITHMS -- 4.1 Local Engines -- 4.2 Dedicated Engines -- 4.3 Cryptographic Algorithms -- 4.4 Summary -- 5 KEYS: VAULTS, MANIFESTS, AND MANAGERS -- 5.1 Key Vaults -- 5.2 Key Manifests -- 5.3 Key Managers -- 5.4 Summary -- 6 CRYPTOGRAPHIC PROVIDERS AND CONSUMERS -- 6.1 The Provider -- 6.2 The Consumer -- 6.3 Summary -- PART III: The Cryptographic Project -- 7 MANAGING THE CRYPTOGRAPHIC PROJECT -- 7.1 A Security Culture -- 7.2 Engaging the Customer -- 7.3 Project Scope -- 7.4 Project Roles -- 7.5 Summary -- 8 REQUIREMENTS HARDENING -- 8.1 Security Requirements, Policies, and Standards -- 8.2 Common Requirements -- 8.3 Requirements Review -- 8.4 Specifying the Cryptographic Standard -- 8.5 Data Classification -- 8.6 Summary -- 9 DESIGN HARDENING -- 9.1 Data Flow Diagrams -- 9.2 Design Guidelines -- 9.3 Threat Modeling -- 9.4 Security Patterns -- 9.5 Designing the Cryptosystem -- 9.6 Summary -- 10 SECURE DEVELOPMENT -- 10.1 Guidelines for Secure Development -- 10.2 Summary -- 11 TESTING -- 11.1 Functional Security Testing -- 11.2 Penetration Testing -- 11.3 Summary -- 12 DEPLOYMENT, DEFENSE, AND DECOMMISSIONING -- 12.1 Deployment -- 12.2 Defense.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 12.3 Decommissioning -- 12.4 Summary -- PART IV: Example Code -- 13 ABOUT THE EXAMPLES -- 13.1 Utilities and Common Services -- 13.2 The Example Engine and Key Vault -- 13.3 Summary -- 14 A KEY VAULT -- 14.1 The Local Key -- 14.2 Local Key Store -- 14.3 Accessing a Local Key -- 14.4 Summary -- 15 THE MANIFEST -- 15.1 The Key Alias -- 15.2 Summary -- 16 THE KEY MANAGER -- 16.1 KeyTool -- 16.2 Summary -- 17 THE ENGINE -- 17.1 The Local Engine -- 17.2 Summary -- 18 RECEIPTS AND THE PROVIDER -- 18.1 Encryption Requests and Decryption Results -- 18.2 Receipts -- 18.3 The Provider -- 18.4 Summary -- 19 THE CONSUMER -- 19.1 Customer Information -- 19.2 Credit Card Information -- 19.3 The Customer Manager -- 19.4 Summary -- 20 EXCEPTIONS -- 20.1 Alias Exception -- 20.2 Invalid Key State Exception -- 20.3 Key Not Found Exception -- 20.4 Live Key Not Found Exception -- 20.5 Multiple Alias ID Exception -- 20.6 Customer Not Found Exception -- 20.7 Summary -- 21 THE SYSTEM AT WORK -- 21.1 Setting Up Keys -- 21.2 Working with Customer Information -- 21.3 Replacing a Key -- 21.4 Replacing the Key-Encrypting Key -- 21.5 Summary -- BIBLIOGRAPHY -- GLOSSARY -- INDEX -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- Z.
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Kenan, Kevin
Title Cryptography In The Database: The Last Line Of Defense
Place, publisher, and date of publication Noida : Pearson India,c2005
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126416">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5126416</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification Online access     CENTRAL LIBRARY Digital Library Digital Library 05/01/2019   005.82 KEV-C E0108 05/01/2019 05/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery