APLIKASI PENGAMANAN BASIS DATA MENGGUNAKAN ALGORITMA XXTEA
Theft of data derived from database backups can be a loophole in data security. These loopholes can be avoided by securing using cryptography on data backup files. So unauthorized parties cannot exploit loopholes to misuse data. The method that the author uses in this final task is the encryption me...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-02-14.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!