talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

615

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
Private Security and the Investigative Process, Fourth Edition, 4th Edition

Private Security and the Investigative Process, Fourth Edition targets those students in the early phases of their study of private sector justice and the principles of investigative practice most relevant to the private security industry. The book lays out not only the basic steps taken by entry level as well advanced security professionals conducting investigations, but also provides an overview of the professional security industry and landscape as a whole.

IBM Spectrum Scale Immutability Introduction, Configuration Guidance, and Use Cases

This IBM Redpaper™ publication introduces the IBM Spectrum Scale immutability function. It shows how to set it up and presents different ways for managing immutable and append-only files. This publication also provides guidance for implementing IT security aspects in an IBM Spectrum Scale cluster by addressing regulatory requirements. It also describes two typical use cases for managing immutable files. One use case involves applications that manage file immutability; the other use case presents a solution to automatically set files to immutable within a IBM Spectrum Scale immutable fileset.

Securing Your Cloud: IBM Security for LinuxONE

As workloads are being offloaded to IBM® LinuxONE based cloud environments, it is important to ensure that these workloads and environments are secure. This IBM Redbooks® publication describes the necessary steps to secure your environment from the hardware level through all of the components that are involved in a LinuxONE cloud infrastructure that use Linux and IBM z/VM®. The audience for this book is IT architects, IT Specialists, and those users who plan to use LinuxONE for their cloud environments.

Data Warehousing with Greenplum, 2nd Edition

Data professionals are confronting the most disruptive change since relational databases appeared in the 1980s. SQL is still a major tool for data analytics, but conventional relational database management systems can’t handle the increasing size and complexity of today’s datasets. This updated edition teaches you best practices for Greenplum Database, the open source massively parallel processing (MPP) database that accommodates large sets of nonrelational and relational data. Marshall Presser, field CTO at Pivotal, introduces Greenplum’s approach to data analytics and data-driven decisions, beginning with its shared-nothing architecture. IT managers, developers, data analysts, system architects, and data scientists will all gain from exploring data organization and storage, data loading, running queries, and learning to perform analytics in the database. Discover how MPP and Greenplum will help you go beyond the traditional data warehouse. This ebook covers: Greenplum features, use case examples, and techniques for optimizing use Four Greenplum deployment options to help you balance security, cost, and time to usability Why each networked node in Greenplum’s architecture includes an independent operating system, memory, and storage Additional tools for monitoring, managing, securing, and optimizing query responses in the Pivotal Greenplum commercial database

Operationalizing the Data Lake

Big data and advanced analytics have increasingly moved to the cloud as organizations pursue actionable insights and data-driven products using the growing amounts of information they collect. But few companies have truly operationalized data so it’s usable for the entire organization. With this pragmatic ebook, engineers, architects, and data managers will learn how to build and extract value from a data lake in the cloud and leverage the compute power and scalability of a cloud-native data platform to put your company’s vast data trove into action. Holden Ackerman and Jon King of Qubole take you through the basics of building a data lake operation, from people to technology, employing multiple technologies and frameworks in a cloud-native data platform. You'll dive into the tools and processes you need for the entire lifecycle of a data lake, from data preparation, storage, and management to distributed computing and analytics. You’ll also explore the unique role that each member of your data team needs to play as you migrate to your cloud-native data platform. Leverage your data effectively through a single source of truth Understand the importance of building a self-service culture for your data lake Define the structure you need to build a data lake in the cloud Implement financial governance and data security policies for your data lake through a cloud-native data platform Identify the tools you need to manage your data infrastructure Delineate the scope, usage rights, and best tools for each team working with a data lake—analysts, data scientists, data engineers, and security professionals, among others

Professional Azure SQL Database Administration - Second Edition

Professional Azure SQL Database Administration serves as your comprehensive guide to mastering the management and optimization of cloud-based Azure SQL Database solutions. With the differences and unique features of Azure SQL Database compared to the on-premise SQL Server, this book offers a clear roadmap to efficiently migrate, secure, scale, and maintain these databases in the cloud. What this Book will help me do Understand the differences between Azure SQL Database and on-premise SQL Server and their practical implications. Learn techniques to migrate existing SQL Server databases to Azure SQL Database seamlessly. Discover advanced ways to optimize database performance and scalability leveraging cloud capabilities. Master security strategies for Azure SQL databases, including backup, disaster recovery, and automated tasks. Develop proficiency in using tools such as PowerShell to automate and manage routine database administration tasks. Author(s) Ahmad Osama is an experienced database professional and author specializing in SQL Server and Azure SQL Database administration. With a robust background in database migration, maintenance, and performance tuning, Ahmad expertly bridges the gap between theory and practice. His approachable writing style makes complex database topics accessible to professionals seeking to expand their expertise. Who is it for? Professional Azure SQL Database Administration is an essential resource for database administrators, developers, and IT professionals keen on developing their knowledge about Azure SQL Database administration and cloud database solutions. Whether you're transitioning from traditional SQL Server environments or looking to optimize your database strategies in the cloud, this book caters to professionals with intermediate to advanced experience in database management and programming with SQL.

IBM Spectrum Scale: Big Data and Analytics Solution Brief

This IBM® Redguide™ publication describes big data and analytics deployments that are built on IBM Spectrum Scale™. IBM Spectrum Scale is a proven enterprise-level distributed file system that is a high-performance and cost-effective alternative to Hadoop Distributed File System (HDFS) for Hadoop analytics services. IBM Spectrum Scale includes NFS, SMB, and Object services and meets the performance that is required by many industry workloads, such as technical computing, big data, analytics, and content management. IBM Spectrum Scale provides world-class, web-based storage management with extreme scalability, flash accelerated performance, and automatic policy-based storage tiering from flash through disk to the cloud, which reduces storage costs up to 90% while improving security and management efficiency in cloud, big data, and analytics environments. This Redguide publication is intended for technical professionals (analytics consultants, technical support staff, IT Architects, and IT Specialists) who are responsible for providing Hadoop analytics services and are interested in learning about the benefits of the use of IBM Spectrum Scale as an alternative to HDFS.

IBM Personal Communications and IBM z/OS TTLS Enablement: Technical Enablement Series

The purpose of this document is to complete the task of introducing Transport Layer Security to z/OS® so IBM Personal Communications (PCOMM) uses TLS security. This document walks you through enabling Tunneled Transport Layer Security (TTLS) on your IBM z/OS for use with a PCOMM TN3270 connection. When you complete this task, you require a certificate to access your TN3270 PCOMM session. You work with the following products and components: TN3270 TCPIP PAGENT INET (maybe) IBM RACF® This document assumes that the reader has extensive knowledge of z/OS security administration and these products and components. This document is part of the Technical Enablement Series that was created at the IBM Client Experience Centers.

PostgreSQL 11 Administration Cookbook

Discover practical solutions for administering PostgreSQL 11 databases in "PostgreSQL 11 Administration Cookbook." This recipe-style book provides actionable, step-by-step guidance for efficiently managing PostgreSQL databases, leveraging its features, and optimizing performance. You'll gain comprehensive knowledge to troubleshoot, maintain, and enhance enterprise database systems. What this Book will help me do Understand and implement robust database backup and recovery techniques. Improve the performance of PostgreSQL solutions through expert tuning and diagnostics. Master high availability and replication strategies for PostgreSQL 11. Use hands-on recipes to enhance PostgreSQL security and user management. Learn efficient database management techniques for production environments. Author(s) Simon Riggs, an experienced database architect, along with co-authors Gianni Ciolli and None Meesala, brings years of PostgreSQL expertise to this book. Their collaborative effort ensures a practical yet comprehensive approach to PostgreSQL 11. With rich industry experience, they provide readers with valuable insights to address real-world database challenges. Who is it for? The ideal readers are database administrators, architects, or developers working with PostgreSQL databases. This book is perfect for professionals seeking actionable solutions to PostgreSQL 11 challenges. Prior PostgreSQL knowledge will enhance the learning experience and practical application. If managing and optimizing databases is your goal, this book is tailored for you.

IBM DS8880 Encryption for data at rest and Transparent Cloud Tiering (DS8000 Release 8.5)

-update for Release 8.5 - IBM experts recognize the need for data protection, both from hardware or software failures, and also from physical relocation of hardware, theft, and retasking of existing hardware. The IBM DS8880 supports encryption-capable hard disk drives (HDDs) and flash drives. These Full Disk Encryption (FDE) drive sets are used with key management services that are provided by IBM Security Key Lifecycle Manager software or Gemalto SafeNet KeySecure to allow encryption for data at rest on a DS8880. Use of encryption technology involves several considerations that are critical for you to understand to maintain the security and accessibility of encrypted data. The IBM Security Key Lifecycle Manager software also supports Transparent Cloud Tiering (TCT) data object encryption, which is part of this publication. With TCT encryption, data is encrypted before it is transmitted to the Cloud. The data remains encrypted in cloud storage and is decrypted after it is transmitted back to the DS8000®. This IBM Redpaper™ publication contains information that can help storage administrators plan for disk and TCT data object encryption. It also explains how to install and manage the encrypted storage and how to comply with IBM requirements for using the IBM DS8000 encrypted disk storage system. This edition focuses on IBM Security Key Lifecycle Manager Version 3.0 which enables support Key Management Interoperability Protocol (KMIP) with the DS8000 Release 8.5 code or later and updated GUI for encryption functions. The publication also discusses support for data at rest encryption with Gemalto SafeNet KeySecure Version 8.3.2.

IBM Hyper-Scale Manager for IBM Spectrum Accelerate Family: IBM XIV, IBM FlashSystem A9000 and A9000R, and IBM Spectrum Accelerate

This IBM® Redbooks® publication describes storage management functions and their configuration and use with the IBM Hyper-Scale Manager management graphical user interface (GUI) for IBM XIV® Gen3, IBM FlashSystem® A9000 and A9000R, and IBM Spectrum™ Accelerate software. The web-based GUI provides a revolutionary object-centered interface design that is aimed toward ease of use together with enhanced efficiency for storage administrators. The first chapter describes general features of the GUI and installation of the IBM Hyper-Scale Manager server. Subsequent chapters illustrate some typical GUI actions, among many other possibilities, to manage and configure the storage systems, to define security roles, and to set up multitenancy. For most of the GUI-based actions that are illustrated in this book, the corresponding XIV Storage System command-line interface (XCLI) commands are also shown. This edition applies to IBM Hyper-Scale Manager V5.4. IBM Hyper-Scale Manager based GUI information regarding host attachment and replication is covered in IBM FlashSystem A9000, IBM FlashSystem A9000R, and IBM XIV Storage System: Host Attachment and Interoperability, SG24-8368 and IBM FlashSystem A9000 and A9000R Business Continuity Solutions, REDP-5401. See also IBM HyperSwap and Multi-site HA/DR for IBM FlashSystem A9000 and A9000R, REDP-5434.

Social-Behavioral Modeling for Complex Systems

This volume describes frontiers in social-behavioral modeling for contexts as diverse as national security, health, and on-line social gaming. Recent scientific and technological advances have created exciting opportunities for such improvements. However, the book also identifies crucial scientific, ethical, and cultural challenges to be met if social-behavioral modeling is to achieve its potential. Doing so will require new methods, data sources, and technology. The volume discusses these, including those needed to achieve and maintain high standards of ethics and privacy. The result should be a new generation of modeling that will advance science and, separately, aid decision-making on major social and security-related subjects despite the myriad uncertainties and complexities of social phenomena. Intended to be relatively comprehensive in scope, the volume balances theory-driven, data-driven, and hybrid approaches. The latter may be rapidly iterative, as when artificial-intelligence methods are coupled with theory-driven insights to build models that are sound, comprehensible and usable in new situations. With the intent of being a milestone document that sketches a research agenda for the next decade, the volume draws on the wisdom, ideas and suggestions of many noted researchers who draw in turn from anthropology, communications, complexity science, computer science, defense planning, economics, engineering, health systems, medicine, neuroscience, physics, political science, psychology, public policy and sociology. In brief, the volume discusses: Cutting-edge challenges and opportunities in modeling for social and behavioral science Special requirements for achieving high standards of privacy and ethics New approaches for developing theory while exploiting both empirical and computational data Issues of reproducibility, communication, explanation, and validation Special requirements for models intended to inform decision making about complex social systems

Getting Started with Linux on Z Encryption for Data At-Rest

This IBM® Redbooks® publication provides a general explanation of data protection through encryption and IBM Z® pervasive encryption with a focus on Linux on IBM Z encryption for data at-rest. It also describes how the various hardware and software components interact in a Linux on Z encryption environment for . In addition, this book concentrates on the planning and preparing of the environment. It offers implementation, configuration, and operational examples that can be used in Linux on Z volume encryption environments. This publication is intended for IT architects, system administrators, and security administrators who plan for, deploy, and manage security on the Z platform. The reader is expected to have a basic understanding of IBM Z security concepts.

Data-at-rest Encryption for the IBM Spectrum Accelerate Family

With the ever-growing landscape of national, state, and local regulations, industry requirements, and increased security threats, ensuring the protection of an organization's information is a key part of operating a successful business. Encrypting data-at-rest is a key element when addressing these concerns. Most storage products offer encryption at an additional cost. The IBM® Spectrum Accelerate family, which includes IBM XIV® Storage System, IBM FlashSystem® A9000, IBM FlashSystem A9000R system(s), and IBM Spectrum™ Accelerate Software provides data-at-rest encryption at no charge. Clients can take advantage of encryption and still benefit from the lower total cost of ownership (TCO) that the IBM Spectrum Accelerate™ family offers. For IBM FlashSystem A9000 and A9000R, clients now have a choice between an external key manager-based implementation or a local key based encryption implementation. The local key solution offers a simplified deployment of data-at-rest encryption. This IBM Redpaper™ publication explains the architecture and design of the XIV and IBM FlashSystem A9000 and A9000R encryption solutions. Details are provided for configuring and implementing both solutions.

My Online Privacy for Seniors, First Edition

My Online Privacy for Seniors is an exceptionally easy and complete guide to protecting your privacy while you take advantage of the extraordinary resources available to you through the Internet and your mobile devices. It approaches every topic from a senior’s point of view, using meaningful examples, step-by-step tasks, large text, close-up screen shots, and a custom full-color interior designed for comfortable reading. Full-color, step-by-step tasks–in legible print–walk you through how to keep your personal information and content secure on computers and mobile devices. Learn how to: Strengthen your web browser’s privacy in just a few steps Make it harder to track and target you with personalized ads Protect against dangerous fake emails and ransomware Securely bank and shop online Control who sees your Facebook or Instagram posts and photos you share Securely use cloud services for backups or shared projects Protect private data on your mobile device, even if it’s stolen Block most unwanted calls on your smartphone Improve your home’s Internet security quickly and inexpensively Get straight answers to online privacy questions–in steps that are simple to follow and easy to understand You don’t have to avoid today’s amazing digital world: you can enrich your life, deepen your connections, and still keep yourself safe.

Oracle DBA Mentor: Succeeding as an Oracle Database Administrator

New Oracle database administrators can get off the ground running. This book helps you develop the ability to think on your feet and move focus in an instant from arcane syntax details to broad, corporate issues. Along the way, you will see how to create your first database and implement best practices to ensure a well-running database system. What makes Oracle DBA Mentor different is that it also teaches you how to obtain answers that are not found in this or other books. Focus is given to creating a test bed and running test cases to examine hypotheses and prove out solutions so you can be sure they work in production. Attention is given to navigating product documentation and networking in forums and social media to build your skills and a network to draw on when solving problems under pressure. There are chapters of step-by-step technical content as well as coverage of essential skills to succeed as a DBA no matter which database engine you administer. By the time you are done reading this book, you will have confidence to face many of the situations thrown in your direction. You will know where to go for the answers you don’t yet know that you need. You’ll be able to work and troubleshoot under pressure. You’ll know how to create a database, institute backup and recovery procedures, secure the database and its valuable corporate data, and acquire more knowledge as needed so you can run a database to meet the needs of your organization. What You'll Learn Install Oracle Database with best practices Implement backup and recovery procedures Understand the fundamentals of databases and data security Find answers to technical problems using Oracle documentation, Oracle Support, and other resources Patch and upgrade an Oracle database Who This Book Is For The novice database administrator who wants help getting off the ground with their DBA career, and in building the skills to let that career flourish in the long term. Mid-level DBAs will also find the book helpful as they try to grow their career to the next level. While the book is geared toward the Oracle platform, database administrators from other platforms can benefit from the soft skills covered in this book.

AI and Big Data on IBM Power Systems Servers

Abstract As big data becomes more ubiquitous, businesses are wondering how they can best leverage it to gain insight into their most important business questions. Using machine learning (ML) and deep learning (DL) in big data environments can identify historical patterns and build artificial intelligence (AI) models that can help businesses to improve customer experience, add services and offerings, identify new revenue streams or lines of business (LOBs), and optimize business or manufacturing operations. The power of AI for predictive analytics is being harnessed across all industries, so it is important that businesses familiarize themselves with all of the tools and techniques that are available for integration with their data lake environments. In this IBM® Redbooks® publication, we cover the best practices for deploying and integrating some of the best AI solutions on the market, including: IBM Watson Machine Learning Accelerator (see note for product naming) IBM Watson Studio Local IBM Power Systems™ IBM Spectrum™ Scale IBM Data Science Experience (IBM DSX) IBM Elastic Storage™ Server Hortonworks Data Platform (HDP) Hortonworks DataFlow (HDF) H2O Driverless AI We map out all the integrations that are possible with our different AI solutions and how they can integrate with your existing or new data lake. We also walk you through some of our client use cases and show you how some of the industry leaders are using Hortonworks, IBM PowerAI, and IBM Watson Studio Local to drive decision making. We also advise you on your deployment options, when to use a GPU, and why you should use the IBM Elastic Storage Server (IBM ESS) to improve storage management. Lastly, we describe how to integrate IBM Watson Machine Learning Accelerator and Hortonworks with or without IBM Watson Studio Local, how to access real-time data, and security. Note: IBM Watson Machine Learning Accelerator is the new product name for IBM PowerAI Enterprise. Note: Hortonworks merged with Cloudera in January 2019. The new company is called Cloudera. References to Hortonworks as a business entity in this publication are now referring to the merged company. Product names beginning with Hortonworks continue to be marketed and sold under their original names.

Mastering Hadoop 3

"Mastering Hadoop 3" is your in-depth guide to understanding and mastering the advanced features of the Hadoop ecosystem. With a focus on distributed computing and data processing, this book covers essential tools such as YARN, MapReduce, and Apache Spark to help you build scalable, efficient data pipelines. What this Book will help me do Gain a comprehensive understanding of Hadoop Distributed File System (HDFS) and YARN for effective resource management. Master data processing with MapReduce and learn to integrate with real-time processing engines like Spark and Flink. Develop and secure enterprise-grade Hadoop-based data pipelines by implementing robust security and governance measures. Explore techniques for batch data processing, data modeling, and designing applications tailored for Hadoop environments. Understand best practices for optimizing and troubleshooting Hadoop clusters for enhanced performance and reliability. Author(s) The authors, including None Wong, None Singh, and None Kumar, bring together years of experience in big data engineering, distributed systems, and enterprise application development. They aim to provide a clear pathway to mastering Hadoop ecosystem tools. Who is it for? This book is ideal for budding big data professionals who have some familiarity with Java and basic Hadoop concepts and wish to elevate their expertise. If you're a Hadoop career practitioner keen to expand your understanding of the ecosystem's advanced capabilities or a professional looking to implement Hadoop in organizational workflows, this book is well-suited for you.

Advanced MySQL 8

Dive into the world of MySQL 8.0 with this comprehensive guide, tailored for professionals seeking to optimize and expand their database capabilities. You will master techniques to improve performance, scalability, and security in your database applications, making them robust and efficient. What this Book will help me do Learn to implement and analyze large queries efficiently in MySQL 8.0. Gain insights into optimizing performance by leveraging MySQL indexing and settings. Understand advanced replication techniques, including Group Replication and its applications in InnoDB clusters. Master the essentials of database monitoring and managing large distributed instances. Explore methods for backup, recovery, and enhancing data security within MySQL. Author(s) None Vanier, None Shah, and None Malepati are seasoned database experts with extensive experience in MySQL and database management. They have worked on scaling enterprise-level database applications, focusing on improving performance and reliability. They bring real-world insights and a clear, practical approach to this book, making it an invaluable resource for developers and administrators alike. Who is it for? This book is perfect for database administrators, developers, and system architects who already have a foundational understanding of MySQL and are looking to deepen their expertise. If you're someone interested in enhancing database application performance, mastering advanced techniques, or handling distributed databases and scaling challenges, this book will surely cater to your professional aspirations.

IBM Spectrum Scale and IBM StoredIQ: Identifying and securing your business data to support regulatory requirements

Having the appropriate storage for hosting business critical data and the proper analytic software for deep inspection of that data is becoming necessary to get deeper insights into the data so that users can categorize which data qualifies for compliance. This IBM® Redpaper™ publication explains why the storage features of IBM Spectrum™ Scale, when combined with the data analysis and categorization features of IBM StoredIQ®, provide an excellent platform for hosting unstructured business data that is subject to regulatory compliance guidelines, such as General Data Protection Regulation (GDPR). In this paper, we describe how IBM StoredIQ can be used to identify files that are stored in an IBM Spectrum Scale™ file system that include personal information, such as phone numbers. These files can be secured in another file system partition by encrypting those files by using IBM Spectrum Scale functions. Encrypting files prevents unauthorized access to those files because only users that can access the encryption key can decrypt those files. This paper is intended for chief technology officers, solution, and security architects and systems administrators.