Database encryption

Results: 73



#Item
11Tokenization / Oracle Corporation / Oracle Database / Encryption / Electronic business / Oracle Media Objects / Vormetric / Transparent Data Encryption / Cryptography / Software / Computing

Oracle CardConnect is the only Oracle-validated integration for payment security. CardConnect for Oracle provides a central location for the management of encryption keys and tokens in addition to providing services to n

Add to Reading List

Source URL: www.cardconnect.com

Language: English - Date: 2014-12-29 16:44:52
12Cross-platform software / Oracle Database / X Window System / Client–server model / Software / Computing / Relational database management systems

Dynamic Searchable Encryption via Blind Storage Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter University of Illinois at Urbana-Champaign Abstract—Dynamic Searchable Symmetric Encryption allows a client to store a

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
13Disk encryption / Core dump / Database management systems / Digital forensics / Computing / Computer memory

Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process AAron Walters Nick L. Petroni, Jr. Komoku, Inc.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:25
14Transparent Data Encryption / Oracle Database / Oracle Corporation / Keystore / Oracle RAC / Key management / Oracle Enterprise Manager / Oracle Application Express / Vormetric / Software / Disk encryption / Computing

Oracle® Database Advanced Security Guide 12.1 E50333-09 May 2015

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-05-28 23:47:04
15Cryptography / Internet search / Deterministic encryption / Nearest neighbor search / Search engine indexing / Database / Web search query / ANts P2P / Information science / Information retrieval / Searching

Usable Secure Private Search Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin and Salvatore J. Stolfo Department of Computer Science Columbia University New York NY, 10027, USA

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
16Cross-platform software / Oracle Database / Oracle Corporation / Transparent Data Encryption / DUAL table / Oracle Technology Network / Database / Oracle Enterprise Manager / Oracle RAC / Software / Computing / Relational database management systems

Oracle® Database 2 Day + Security Guide 12c ReleaseE17609-21 May 2015

Add to Reading List

Source URL: docs.oracle.com

Language: English - Date: 2015-05-28 22:26:58
17Cryptographic software / Public-key cryptography / Encryption / Cryptography / ANts P2P / Database

577 Hitachi Review Vol), No. 9 Featured Articles

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-03-31 01:09:15
18Cyberwarfare / McAfee / Data loss prevention software / USB flash drive / Database activity monitoring / Disk encryption / Threat / Encryption / Database / Computer security / Computer network security / Security

32700_ref-architecture_0911_levels_4C

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:04
19Information technology management / Data management / Data security / Crime prevention / National security / Backup / Database / Computer security / Encryption / Security / Computer network security / Computing

PDF Document

Add to Reading List

Source URL: www.vsysone.com

Language: English
20Crime prevention / National security / Computer security / Data management / Data security / Password / Network security / Encryption / Database / Security / Cryptography / Computing

Data Security and Classification Guidelines

Add to Reading List

Source URL: media.umassp.edu

Language: English - Date: 2008-01-16 13:50:09
UPDATE