Skip to main content
You are the owner of this article.
You have permission to edit this article.
Edit

It includes high-level detail on managing encryption over time, its impact on database performance, and critical recovery procedures for server failures. Key Sections & Topics

“I've been more productive with this book in one week than I had been in a month or more without it. ... In using this book to implement Extensible Key Management (EKM) via Microsoft Azure, I must report that Microsoft has changed its methodology and this...” Amazon UK

Are you planning to implement a , like Always Encrypted , or

Reviewers from Amazon praise the book for cutting through "the fog" of fragmented online articles, providing a well-organized spotlight on complex topics like Always Encrypted and TDE .

The author maintains an errata list on his personal blog to address minor typos and technical corrections.

– Extensive coverage of Always Encrypted and the use of Enclaves . Critical Perspectives

The book is structured to help you architect strategies for new apps or retrofit encryption into existing ones. It covers encryption at rest , in transit , and in memory .

Get up-to-the-minute news sent straight to your device.

Topics

all