64,19 €*
Versandkostenfrei per Post / DHL
Aktuell nicht verfügbar
The book highlights work that Microsoft has been doing since 2016 to make encryption more accessible, by making TDE available in the standard edition, and the introduction of Always Encrypted that requires minimal work on your part to implement powerful and effective encryption, protecting your dataand meeting regulatory requirements. The book teaches you how to work with the encryption technologies in SQL Server with the express goal of helping you understand those technologies on an intuitive level. Yoüll come away with a deep level of understanding that allows you to answer questions and speak as an expert. The book¿s aim is to make you as comfortable in deploying encryption in SQL Server as you would be in driving your car to buy groceries.
Those with a data security mindset will appreciate the discussion of how each feature protects you and what it protects you from, as well as how to implement things in the most secure manner. Database administrators will appreciate the high level of detail around managing encryption over time and the effect of encryption on database performance. All readers will appreciate the advice on how to avoid common pitfalls, ensuring that your projects to implement encryption run smoothly.
Retrofit encryption into your existing applications
Encrypt data at rest, in memory, and in transit
Manage key and certificate life cycles, including backup and restore
Recover encrypted databases in case of server failure
Work with encryption in cloud-based scenarios
The book highlights work that Microsoft has been doing since 2016 to make encryption more accessible, by making TDE available in the standard edition, and the introduction of Always Encrypted that requires minimal work on your part to implement powerful and effective encryption, protecting your dataand meeting regulatory requirements. The book teaches you how to work with the encryption technologies in SQL Server with the express goal of helping you understand those technologies on an intuitive level. Yoüll come away with a deep level of understanding that allows you to answer questions and speak as an expert. The book¿s aim is to make you as comfortable in deploying encryption in SQL Server as you would be in driving your car to buy groceries.
Those with a data security mindset will appreciate the discussion of how each feature protects you and what it protects you from, as well as how to implement things in the most secure manner. Database administrators will appreciate the high level of detail around managing encryption over time and the effect of encryption on database performance. All readers will appreciate the advice on how to avoid common pitfalls, ensuring that your projects to implement encryption run smoothly.
Retrofit encryption into your existing applications
Encrypt data at rest, in memory, and in transit
Manage key and certificate life cycles, including backup and restore
Recover encrypted databases in case of server failure
Work with encryption in cloud-based scenarios
Helps you encrypt your data both in the file system and over the network
Shows how encryption can be implemented without any modifications to your applications
Provides deep technical knowledge that leads to an intuitive understanding and the confidence to speak as an expert
Introduction.- Part I. Understanding the Landscape.- 1. Purpose of Encryption and Available Tools.- Part II. Transparent Data Encryption (TDE).- 2. Introducing Transparent Data Encryption.- 3. Setting Up TDE.- 4. Managing TDE.- 5. Backup Encryption.- Part III. Always Encrypted.- 6. What Is Always Encrypted?.- 7. Setting Up Always Encrypted.- 8. Executing Queries Using Always Encrypted.- 9. Encrypting Existing Data with Always Encrypted.- 10. Limitations with Always Encrypted.- 11. Key Rotation with Always Encrypted.- 12. Considerations When Implementing Always Encrypted.- Part IV. Always Encrypted with Enclaves.- 13. Introducing Always Encrypted With Enclaves.- 14. Setting Up Always Encrypted With Enclaves.- 15. In-Place Encryption With Always Encrypted.- Part V. Completing the Picture.- 16. Rich Querying With Always Encrypted Enclaves.- 17. Setting Up TPM Attestation.- 18. Encryption In Transit Using Transport Level Security.- 19. Hashing and Salting of Passwords.- 20. Extensible Key Management (EKM) .- Appendixes.- A. Glossary of Terms.- B. Encryption in the Cloud.- C. Encryption Algorithms.
Erscheinungsjahr: | 2022 |
---|---|
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
xxiv
351 S. 104 s/w Illustr. 351 p. 104 illus. |
ISBN-13: | 9781484286630 |
ISBN-10: | 1484286634 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | McGiffen, Matthew |
Auflage: | 1st ed. |
Hersteller: |
Apress
Apress L.P. |
Maße: | 254 x 178 x 21 mm |
Von/Mit: | Matthew McGiffen |
Erscheinungsdatum: | 18.11.2022 |
Gewicht: | 0,706 kg |
Helps you encrypt your data both in the file system and over the network
Shows how encryption can be implemented without any modifications to your applications
Provides deep technical knowledge that leads to an intuitive understanding and the confidence to speak as an expert
Introduction.- Part I. Understanding the Landscape.- 1. Purpose of Encryption and Available Tools.- Part II. Transparent Data Encryption (TDE).- 2. Introducing Transparent Data Encryption.- 3. Setting Up TDE.- 4. Managing TDE.- 5. Backup Encryption.- Part III. Always Encrypted.- 6. What Is Always Encrypted?.- 7. Setting Up Always Encrypted.- 8. Executing Queries Using Always Encrypted.- 9. Encrypting Existing Data with Always Encrypted.- 10. Limitations with Always Encrypted.- 11. Key Rotation with Always Encrypted.- 12. Considerations When Implementing Always Encrypted.- Part IV. Always Encrypted with Enclaves.- 13. Introducing Always Encrypted With Enclaves.- 14. Setting Up Always Encrypted With Enclaves.- 15. In-Place Encryption With Always Encrypted.- Part V. Completing the Picture.- 16. Rich Querying With Always Encrypted Enclaves.- 17. Setting Up TPM Attestation.- 18. Encryption In Transit Using Transport Level Security.- 19. Hashing and Salting of Passwords.- 20. Extensible Key Management (EKM) .- Appendixes.- A. Glossary of Terms.- B. Encryption in the Cloud.- C. Encryption Algorithms.
Erscheinungsjahr: | 2022 |
---|---|
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
xxiv
351 S. 104 s/w Illustr. 351 p. 104 illus. |
ISBN-13: | 9781484286630 |
ISBN-10: | 1484286634 |
Sprache: | Englisch |
Ausstattung / Beilage: | Paperback |
Einband: | Kartoniert / Broschiert |
Autor: | McGiffen, Matthew |
Auflage: | 1st ed. |
Hersteller: |
Apress
Apress L.P. |
Maße: | 254 x 178 x 21 mm |
Von/Mit: | Matthew McGiffen |
Erscheinungsdatum: | 18.11.2022 |
Gewicht: | 0,706 kg |