- Agents Unleashed
- Attention Must Be Paid
- Compression Algorithms
- Digital Cash 2nd Edition
- Digital Copyright Protection
- Disappearing Cryptography 1st Edition
- Disappearing Cryptography 2nd Edition
- Disappearing Cryptography 3rd Edition
- Free for All
- Future Ride
- How to Hide Online iPad App
- Java Beans Programming
- Java RAMBO Manifesto
- Policing Online Games
- Translucent Databases
- Case Studies in Translucent Databases
- Case Study: Libraries
- Case Study: Online Shopping
- Discount Code for Owners of 1st Edition
- Errata for First Edition
- Errata for Second Edition
- Ordering the 1st Edition
- Ordering the 2nd Edition
- Ordering the Lite Edition
- Table of Contents
- Table of Contents for Second Edition
- Table of Contents of Lite Edition
Do you have personal information in your database?
Do you keep files on your customers, your employees, or anyone else?
Do you need to worry about European laws restricting the information you keep?
Do you keep copies of credit card numbers, social security numbers, or other information that might be useful to identity thieves or insurance fraudsters?
Do you deal with medical records or personal secrets?
Most database administrators have some of these worries. Some have all of them. That's why database security is so important.
This new book, Translucent Databases, describes a different attitude toward protecting the information. Most databases provide elaborate control mechanisms for letting the right people in to see the right records. These tools are well-designed and thoroughly tested, but they can only provide so much support. If someone breaks into the operating system itself, all of the data on the hard disk is unveiled. If a clerk, a supervisor, or a system administrator decides to turn traitor, there's nothing anyone can do.
Translucent databases provide better, deeper protection by scrambling the data with encryption algorithms. The solutions use the minimal amount of encryption to ensure that the database is still functional. In the best applications, the personal and sensitive information is protected but the database still delivers the information.
There's now a second edition of the best selling book about building computer systems that do useful work without holding any useful information. It comes with four new chapters and hundreds of revisions.