17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3 – Schema Architecture StrategiesSummaryThe methods that are presented in this chapter do not suggest that obscurity andabstraction alone are sufficient methods to protect sensitive data. Implementingmethods of obscurity in concert with additional methods of obfuscation,encryption and access management provide a more complex and secureenvironment than implementing any single method.83

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!