Abstract
This chapter talks about all the various ways of encryption and hashing data so that unauthorized users cannot access your data.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
https://doi.org/10.1016/b978-0-12-801275-8.00004-x
Copy DOIJournal: Securing SQL Server | Publication Date: Jan 1, 2015 |
This chapter talks about all the various ways of encryption and hashing data so that unauthorized users cannot access your data.
Join us for a 30 min session where you can share your feedback and ask us any queries you have