blogs.perficient.com/2022/01/31/beyond-encryption-protect-sensitive-data-using-l-diversity

Preview meta tags from the blogs.perficient.com website.

Linked Hostnames

11

Thumbnail

Search Engine Appearance

Google

https://blogs.perficient.com/2022/01/31/beyond-encryption-protect-sensitive-data-using-l-diversity

Beyond Encryption: Protect sensitive data using l-diversity / Blogs / Perficient

Beyond Encryption: implementing anonymity algorithms to protect sensitive data across multiple database platforms



Bing

Beyond Encryption: Protect sensitive data using l-diversity / Blogs / Perficient

https://blogs.perficient.com/2022/01/31/beyond-encryption-protect-sensitive-data-using-l-diversity

Beyond Encryption: implementing anonymity algorithms to protect sensitive data across multiple database platforms



DuckDuckGo

https://blogs.perficient.com/2022/01/31/beyond-encryption-protect-sensitive-data-using-l-diversity

Beyond Encryption: Protect sensitive data using l-diversity / Blogs / Perficient

Beyond Encryption: implementing anonymity algorithms to protect sensitive data across multiple database platforms

  • General Meta Tags

    30
    • title
      Beyond Encryption: Protect sensitive data using l-diversity / Blogs / Perficient
    • charset
      utf-8
    • robots
      all
    • apple-mobile-web-app-title
      Perficient
    • application-name
      Perficient
  • Open Graph Meta Tags

    10
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      Beyond Encryption: Protect sensitive data using l-diversity / Blogs / Perficient
    • og:description
      Beyond Encryption: implementing anonymity algorithms to protect sensitive data across multiple database platforms
    • og:url
      https://blogs.perficient.com/2022/01/31/beyond-encryption-protect-sensitive-data-using-l-diversity/
  • Twitter Meta Tags

    5
    • twitter:card
      summary_large_image
    • twitter:label1
      Written by
    • twitter:data1
      David Callaghan
    • twitter:label2
      Est. reading time
    • twitter:data2
      5 minutes
  • Link Tags

    44
    • EditURI
      https://blogs.perficient.com/xmlrpc.php?rsd
    • alternate
      https://blogs.perficient.com/feed/
    • alternate
      https://blogs.perficient.com/comments/feed/
    • alternate
      https://blogs.perficient.com/2022/01/31/beyond-encryption-protect-sensitive-data-using-l-diversity/feed/
    • alternate
      https://blogs.perficient.com/wp-json/wp/v2/posts/304066

Links

30