Security
Protecting Sensitive Data
with MySQL and PHP
Conférence PHP Québec
Montréal
March 20, 2003
Zak Greant
zak@mysql.com
slides/sensitive/titlepage.xml
slides/sensitive/setup.xml
slides/sensitive/followup.xml
slides/sensitive/credits.xml
slides/sensitive/thank_you.xml
slides/sensitive/introduction.xml
slides/sensitive/sensitive_data.xml
slides/sensitive/identity_crisis.xml
slides/sensitive/reputation_poisoning.xml
slides/sensitive/you_get_the_idea.xml
slides/sensitive/risks.xml
slides/sensitive/broad_vulnerabilities.xml
slides/sensitive/solutions.xml
slides/sensitive/specific_focus.xml
slides/sensitive/drawbacks.xml
slides/sensitive/advantages.xml
slides/sensitive/tools.xml
slides/sensitive/quantization.xml
slides/sensitive/data_poisoning_and_decoys.xml
slides/sensitive/crypto_hashes.xml
slides/sensitive/public_key_encryption.xml
slides/sensitive/private_key_encryption.xml
slides/sensitive/key_exchange_distro.xml
slides/sensitive/mysql.xml
slides/sensitive/php.xml
slides/sensitive/example_code.xml
slides/sensitive/example_code_2.xml
slides/sensitive/example_code_3.xml
slides/sensitive/questions.xml