O'Reilly logo

Understanding DB2® 9 Security: DB2® Information Management Software by Yuk-Kuen Henry Chan, Carmen Ka Man Wong, Kevin Yeung-Kuen See, Rebecca Bond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Encryption (Cryptography) in DB2

When you were a kid, did you play hide and seek? Remember at twilight when you used to hide in the shadows and use the absence of light to provide an extra layer of concealment? Encryption is way better than that. It is even better than an invisible DBA cape.

First Words

The Internet is such a part of our lives these days. We use it more and more for normal day-to-day commerce. Banking and financial institutions are now online, as are many critical government agencies. International trade is facilitated via the Internet. With these communication advances, many of us can work “remotely” now with geographic restrictions no longer serving as a limiting factor on the proximity of our work location to our ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required