Databases Reference
In-Depth Information
00e0 0d 00 00 00 01 03 03 00 00 00 03 4c 4f 43 00 00 ........ ...LOC..
00f0 00 00 00 00 00 00 07 00 00 00 07 78 68 07 1b 10 ........ ...xh...
0100 17 3b 06 02 03 00 00 00 01 00 00 00 00 00 00 00 .;...... ........
0110 00 00 00 00 07 02 c1 0b 0a 41 43 43 4f 55 4e 54 ........ .
ACCOUNT
0120 49 4e 47 08 4e 45 57 20 59 4f 52 4b 08 05 00 50
...P
0130 17 10 00 00 00 00 00 03 00 00 00 00 00 00 00 00 ........ ........
0140 00 00 00 00 00 00 00 04 01 00 00 00 01 00 00 00 ........ ........
0150 00 00 00 00 00 00 03 00 0e 00 03 00 00 00 00 00 ........ ........
0160 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........
0170 00 00 20 00 00 01 00 00 00 00 00 00 00 00 00 00 .. ..... ........
0180 00 00 00 00 00 00 00 .......
ING.NEW YORK
0000 00 0d 56 b2 05 34 00 0e d7 98 07 7f 08 00 45 00 ..V..4.. ......E.
0010 00 e4 5d 4e 40 00 3f 06 58 b6 c0 a8 02 17 c0 a8 ..]N@.?. X.......
0020 01 a8 05 f2 0d bf 2e 5f 37 d9 64 56 a7 d4 50 18 ......._ 7.dV..P.
0030 2c 37 16 91 00 00 00 bc 00 00 06 00 00 00 00 00 ,7...... ........
0040 06 02 03 00 00 00 0f 00 00 00 01 00 00 00 01 07 ........ ........
0050 00 00 00 00 07 02 c1 15 08 52 45 53 45 41 52 43 ........ .
RESEARC
0060 48 06 44 41 4c 4c 41 53 15 03 00 07 07 02 c1 1f
H.DALLAS
........
0070 05 53 41 4c 45 53 07 43 48 49 43 41 47 4f 15 03 .
SALES.C HICAGO
..
0080 00 07 07 02 c1 29 0a 4f 50 45 52 41 54 49 4f 4e .....).
O PERATION
0090 53 06 42 4f 53 54 4f 4e 04 01 00 00 00 04 00 00
........
00a0 00 7b 05 00 00 00 00 03 00 00 00 03 00 20 00 00 .{...... ..... ..
00b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ........ ........
00c0 00 00 00 21 00 00 01 00 00 00 00 00 00 00 00 00 ...!.... ........
00d0 00 00 00 00 00 00 00 00 19 4f 52 41 2d 30 31 34 ........ .ORA-014
00e0 30 33 3a 20 6e 6f 20 64 61 74 61 20 66 6f 75 6e 03: no d ata foun
00f0 64 0a d.
S.BOSTON
Your data is not really secure from prying eyes, unless you take extra
measures to make it so.
10.1.2
Implementation options for encrypting
data-in-transit
Encryption is a mature technology, and securing database communications
usually involves securing TCP/IP sessions. As a result, you can choose from
quite a few implementation options when you wish to encrypt database ses-
sions. These range from database-specific encryption facilities to the use of
core services provided by the operating system. Specifically, you'll see the
following options that provide a sampling of the broad range of techniques:
Search WWH ::




Custom Search