2014-11-13
2,094 reads
2014-11-13
2,094 reads
Arshad Ali demonstrates granular level encryption in detail and explains how it differs from Transparent Data Encryption (TDE).
2014-07-04
6,349 reads
This article details encrypted backups and how they are implemented in SQL Server 2014.
2014-05-15
5,012 reads
A short piece that gives you the basics of how to administer the database master keys that form the basis for encryption inside of your databases.
2014-05-12
12,282 reads
2014-04-22
1,945 reads
2014-04-15
1,631 reads
If you have been in the information technology industry long enough, you have probably heard the expression "this adds overhead" when discussing any extra processing added on to what is considered normal processing. Dallas Snider answers the question of additional overhead caused by encryption.
2014-04-09
4,230 reads
2014-04-08
1,587 reads
K. Brian Kelly is trying to use SQL Server's built-in encryption and sees there are three different options available for an asymmetric key, corresponding to key length. What's the impact of the key length?
2013-08-12
3,228 reads
2013-07-26
1,704 reads
By Steve Jones
This is my last week of the year working (I guess I come back...
By Steve Jones
suente– n. the state of being so familiar with someone that you can be...
Anyone (everyone?) who has ever tried to learn a programming language knows that to...
I am getting the below error when I execute a SQL command in SQL...
I am getting the below error when I execute a SQL command in SQL...
Hi everyone. I have this table and this information. (left side of the image)...