This is the second edition of the widely acclaimed book that redefined how to build databases that protect the user's information. Instead of trying to store sensitive data in a tightly guarded box,... This description may be from another edition of this product.