Introduction
Part I. Understanding the Landscape1. Purpose of Encryption and Available Tools.
Part II. Transparent Data Encryption (TDE)2. Introducing Transparent Data Encryption3. Setting Up TDE4. Managing TDE5. Backup Encryption
Part III. Always Encrypted6. What Is Always Encrypted?7. Setting Up Always Encrypted8. Executing Queries Using Always Encrypted9. Encrypting Existing Data with Always Encrypted10. Limitations with Always Encrypted11. Key Rotation with Always Encrypted12. Considerations When Implementing Always Encrypted
Part IV. Always Encrypted with Enclaves13. Introducing Always Encrypted With Enclaves14. Setting Up Always Encrypted With Enclaves15. In-Place Encryption With Always Encrypted
Part V. Completing the Picture16. Rich Querying With Always Encrypted Enclaves17. Setting Up TPM Attestation18. Encryption In Transit Using Transport Level Security19. Hashing and Salting of Passwords20. Extensible Key Management (EKM)
AppendixesA. Glossary of TermsB. Encryption in the CloudC. Encryption Algorithms.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.