Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible without first being decrypted. It can therefore be said that the purpose of database encryption is to protect the data stored in a database from being accessed by individuals with potentially "malicious" intentions. The act of encrypting a database also reduces the incentive for individuals to hack the aforementioned database as "meaningless" encrypted data is of little to no use for hackers. There are multiple techniques and technologies available for database encryption, the most important of which will be detailed in this article. (Wikipedia).
Network Security: Classical Encryption Techniques
Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography
From playlist Network Security
A #database #index is a data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure. Indexes are used to quickly locate data without having to search every row in a database
From playlist Database
Cryptanalysis of Classical Ciphers
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
From playlist Computer - Cryptography and Network Security
Relational Databases (part 1 of 6)
The essential concepts of relational databases. Part of a larger series teaching programming. Visit codeschool.org
From playlist Relational Databases
An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org
From playlist Cryptography
SQLite Databases With Python - Full Course
In this course you’ll learn the basics of using SQLite3 with Python. SQLite is an easy-to-use database engine included with Python. You’ll learn how to create databases and tables, add data, sort data, create reports, pull specific data, and more. For this course you should already have a
From playlist Python Tutorials
Hash Tables and Hash Functions
This computer science video describes the fundamental principles of the hash table data structure which allows for very fast insertion and retrieval of data. It covers commonly used hash algorithms for numeric and alphanumeric keys and summarises the objectives of a good hash function. Co
From playlist Data Structures
Network Security, Part 1 : Basic Encryption Techniques
Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.
From playlist Network Security
Hacktivity 2010: Post Exploitation Techniques in Oracle Databases
Speaker: László Tóth
From playlist Hacktivity 2010
Black Hat USA 2010: Hacking Oracle From Web Apps 4/5
Speaker: Sumit Siddharth This talk will focus on exploiting SQL injections in web applications with oracle back-end and will discuss all old/new techniques. The talk will target Oracle 9i,10g and 11g (R1 and R2) It is widely considered that the impact of SQL Injection in web apps with Ora
From playlist BH USA 2010 - WHERE DATA LIVES
Cloud Security Tutorial - Cloud Encryption Services
Learn best practices for keeping your data in the cloud safe and secure. Explore more Cloud Security courses and advance your skills on LinkedIn Learning: https://www.linkedin.com/learning/topics/cloud-security?u=0?trk=sme-youtube_M136048R124-15-06_learning&src=yt-other This is an excerpt
From playlist IT Security
How To Create A Dating Web App | Session 03 | Node.js
Don’t forget to subscribe! Through this project series, you will learn the ins and outs of using Node.js and other associated technologies like MongoDB and React.js to develop a powerful dating web app with node.js You can extrapolate the dating web app features or develop web applicatio
From playlist Create A Dating Web App In Node.Js
PGConf NYC 2021 - Data Security using Roles, Privileges and Row Level Security by Abbas Butt
Data Security using Roles, Privileges and Row Level Security by Abbas Butt In this talk we will discuss all the privileges that can be granted to roles in PostgreSQL. We will also discuss What exact permission is provided by each privilege to the roles. We will then go through the design
From playlist PGConf NYC 2021
CERIAS Security: Privacy from accessing databases to location based services 3/5
Clip 3/5 Speaker: Johann-Christoph Freytag · Humboldt University Over the last years it has become apparent that privacy issues become more and more important when accessing data sources either on the Web or by database management systems. That is, the user does not only want to hide the
From playlist The CERIAS Security Seminars 2009
RubyHack 2019 - A Better Way To Manage Secrets by Johnny T
RubyHack 2019 - A Better Way To Manage Secrets by Johnny T Do you know when your API keys are being used? Do you want to make compliance audits easier? Can you immediately stop rogue apps from decrypting sensitive data (during a data breach)? Come learn how to level up your app security a
From playlist RubyHack 2019
DevOpsDays Silicon Valley 2018 - Modern Security With Microservices And The Cloud by Seth Vargo
DevOpsDays Silicon Valley 2018 Modern Security With Microservices And The Cloud by Seth Vargo
From playlist DevOpsDays Silicon Valley 2018
How Apple scans your phone (and how to evade it) - NeuralHash CSAM Detection Algorithm Explained
#apple #icloud #privacy Apple recently announced scanning all images uploaded to iCloud for CSAM (child abuse material), and that this scan would happen locally on users' phones. We take a look at the technical report and explore how the system works in detail, how it is designed to prese
From playlist Papers Explained
Network Security, Part 2 : Public Key Encryption
Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.
From playlist Cryptography, Security
Hacktivity 2010: Writing Your Own Password Cracker Tool
Speaker: Marcell Major
From playlist Hacktivity 2010