Security Protecting Sensitive Data with MySQL and PHP Conférence PHP Québec Montréal March 20, 2003 Zak Greant zak@mysql.com slides/sensitive/titlepage.xml slides/sensitive/setup.xml slides/sensitive/followup.xml slides/sensitive/credits.xml slides/sensitive/thank_you.xml slides/sensitive/introduction.xml slides/sensitive/sensitive_data.xml slides/sensitive/identity_crisis.xml slides/sensitive/reputation_poisoning.xml slides/sensitive/you_get_the_idea.xml slides/sensitive/risks.xml slides/sensitive/broad_vulnerabilities.xml slides/sensitive/solutions.xml slides/sensitive/specific_focus.xml slides/sensitive/drawbacks.xml slides/sensitive/advantages.xml slides/sensitive/tools.xml slides/sensitive/quantization.xml slides/sensitive/data_poisoning_and_decoys.xml slides/sensitive/crypto_hashes.xml slides/sensitive/public_key_encryption.xml slides/sensitive/private_key_encryption.xml slides/sensitive/key_exchange_distro.xml slides/sensitive/mysql.xml slides/sensitive/php.xml slides/sensitive/example_code.xml slides/sensitive/example_code_2.xml slides/sensitive/example_code_3.xml slides/sensitive/questions.xml