APLIKASI PENGAMANAN BASIS DATA MENGGUNAKAN ALGORITMA XXTEA

Theft of data derived from database backups can be a loophole in data security. These loopholes can be avoided by securing using cryptography on data backup files. So unauthorized parties cannot exploit loopholes to misuse data. The method that the author uses in this final task is the encryption me...

Full description

Saved in:
Bibliographic Details
Main Author: Raden Sangunda Marga, (Author)
Format: Book
Published: 2021-02-14.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items