Cryptography

Database encryption

Database encryption can generally be defined as a process that uses an algorithm to transform data stored in a database into "cipher text" that is incomprehensible without first being decrypted. It can therefore be said that the purpose of database encryption is to protect the data stored in a database from being accessed by individuals with potentially "malicious" intentions. The act of encrypting a database also reduces the incentive for individuals to hack the aforementioned database as "meaningless" encrypted data is of little to no use for hackers. There are multiple techniques and technologies available for database encryption, the most important of which will be detailed in this article. (Wikipedia).

Database encryption
Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Tree Indexing in DBMS

A #database #index is a data structure that improves the speed of data retrieval operations on a database table at the cost of additional writes and storage space to maintain the index data structure. Indexes are used to quickly locate data without having to search every row in a database

From playlist Database

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Relational Databases (part 1 of 6)

The essential concepts of relational databases. Part of a larger series teaching programming. Visit codeschool.org

From playlist Relational Databases

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

SQLite Databases With Python - Full Course

In this course you’ll learn the basics of using SQLite3 with Python. SQLite is an easy-to-use database engine included with Python. You’ll learn how to create databases and tables, add data, sort data, create reports, pull specific data, and more. For this course you should already have a

From playlist Python Tutorials

Video thumbnail

Hash Tables and Hash Functions

This computer science video describes the fundamental principles of the hash table data structure which allows for very fast insertion and retrieval of data. It covers commonly used hash algorithms for numeric and alphanumeric keys and summarises the objectives of a good hash function. Co

From playlist Data Structures

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

Black Hat USA 2010: Hacking Oracle From Web Apps 4/5

Speaker: Sumit Siddharth This talk will focus on exploiting SQL injections in web applications with oracle back-end and will discuss all old/new techniques. The talk will target Oracle 9i,10g and 11g (R1 and R2) It is widely considered that the impact of SQL Injection in web apps with Ora

From playlist BH USA 2010 - WHERE DATA LIVES

Video thumbnail

Cloud Security Tutorial - Cloud Encryption Services

Learn best practices for keeping your data in the cloud safe and secure. Explore more Cloud Security courses and advance your skills on LinkedIn Learning: https://www.linkedin.com/learning/topics/cloud-security?u=0?trk=sme-youtube_M136048R124-15-06_learning&src=yt-other This is an excerpt

From playlist IT Security

Video thumbnail

How To Create A Dating Web App | Session 03 | Node.js

Don’t forget to subscribe! Through this project series, you will learn the ins and outs of using Node.js and other associated technologies like MongoDB and React.js to develop a powerful dating web app with node.js You can extrapolate the dating web app features or develop web applicatio

From playlist Create A Dating Web App In Node.Js

Video thumbnail

PGConf NYC 2021 - Data Security using Roles, Privileges and Row Level Security by Abbas Butt

Data Security using Roles, Privileges and Row Level Security by Abbas Butt In this talk we will discuss all the privileges that can be granted to roles in PostgreSQL. We will also discuss What exact permission is provided by each privilege to the roles. We will then go through the design

From playlist PGConf NYC 2021

Video thumbnail

CERIAS Security: Privacy from accessing databases to location based services 3/5

Clip 3/5 Speaker: Johann-Christoph Freytag · Humboldt University Over the last years it has become apparent that privacy issues become more and more important when accessing data sources either on the Web or by database management systems. That is, the user does not only want to hide the

From playlist The CERIAS Security Seminars 2009

Video thumbnail

RubyHack 2019 - A Better Way To Manage Secrets by Johnny T

RubyHack 2019 - A Better Way To Manage Secrets by Johnny T Do you know when your API keys are being used? Do you want to make compliance audits easier? Can you immediately stop rogue apps from decrypting sensitive data (during a data breach)? Come learn how to level up your app security a

From playlist RubyHack 2019

Video thumbnail

DevOpsDays Silicon Valley 2018 - Modern Security With Microservices And The Cloud by Seth Vargo

DevOpsDays Silicon Valley 2018 Modern Security With Microservices And The Cloud by Seth Vargo

From playlist DevOpsDays Silicon Valley 2018

Video thumbnail

How Apple scans your phone (and how to evade it) - NeuralHash CSAM Detection Algorithm Explained

#apple #icloud #privacy Apple recently announced scanning all images uploaded to iCloud for CSAM (child abuse material), and that this scan would happen locally on users' phones. We take a look at the technical report and explore how the system works in detail, how it is designed to prese

From playlist Papers Explained

Video thumbnail

Network Security, Part 2 : Public Key Encryption

Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.

From playlist Cryptography, Security

Related pages

Transparent data encryption | Key management | Encryption | Probabilistic encryption | BitLocker | Data at rest | Rainbow table