talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

615

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
Microsoft SQL Server 2012 Reporting Services

Use your SQL Server skills to create and manage key data reports Deliver interactive business intelligence reports using SQL Server 2012 Reporting Services, and help facilitate real-time decision making throughout the enterprise. SQL Server expert Stacia Misner shows you in detail how to design, manage, and access custom reports that capture data from multiple sources. This book is ideal for experienced SQL Server developers, whether you’re new to Reporting Services or upgrading from an earlier version. Discover how to: Use the latest features, including the Power View ad hoc reporting tool Design reports by understanding how your audience accesses and uses data Add interactive features to help end users sort and filter data Create rich data visualization with charts, gauges, indictors, and data maps Configure your report server, provide security, and monitor report contents Use SharePoint or Report Manager to search and access reports online Create a library of report parts that clients can use for ad hoc reporting Build and manage reports using Reporting Services as a development platform

MySQL, 5th Edition

MySQL, Fifth Edition by Paul DuBois The definitive guide to using, programming and administering MySQL 5.5 and MySQL 5.6 MySQL provides a comprehensive guide to effectively using and administering the MySQL database management system (DBMS). Author Paul DuBois describes everything from the basics of getting information into a database and formulating queries, to using MySQL with PHP or Perl to generate dynamic web pages, to writing your own programs that access MySQL databases, to administering MySQL servers. The book also includes a comprehensive reference section providing detailed information on MySQL’s structure, language, syntax, and APIs. The fifth edition of this bestselling book has been meticulously revised and updated to thoroughly cover the latest features and capabilities of MySQL 5.5, as well as to add new coverage of features introduced with MySQL 5.6. MySQL is an open source relational database management system (DBMS) that has experienced a phenomenal growth in popularity and use. Known for its speed and ease of use, MySQL has proven itself to be particularly well-suited for developing database-backed websites and applications. MySQL runs on anything from modest hardware all the way up to enterprise servers, and its performance rivals any database system put up against it. Paul DuBois’ MySQL, Fifth Edition, is the definitive guide to fully exploiting all the power and versatility of MySQL 5.5 and MySQL 5.6 Contents at a Glance Part I: General MySQL Use Chapter 1 Getting Started with MySQL Chapter 2 Using SQL to Manage Data Chapter 3 Data Types Chapter 4 Views and Stored Programs Chapter 5 Query Optimization Part II: Using MySQL Programming Interfaces Chapter 6 Introduction to MySQL Programming Chapter 7 Writing MySQL Programs Using C Chapter 8 Writing MySQL Programs Using Perl DBI Chapter 9 Writing MySQL Programs Using PHP Part III: MySQL Administration Chapter 10 Introduction to MySQL Administration Chapter 11 The MySQL Data Directory Chapter 12 General MySQL Administration Chapter 13 Security and Access Control Chapter 14 Database Maintenance, Backups, and Replication Part IV: Appendixes Appendix A Software Required to Use This Book Appendix B Data Type Reference Appendix C Operator and Function Reference Appendix D System, Status, and User Variable Reference Appendix E SQL Syntax Reference Appendix F MySQL Program Reference Online Appendixes: Appendix G C API Reference Appendix H Perl DBI API Reference Appendix I PHP API Reference .

Cyberethics: Morality and Law in Cyberspace, 5th Edition

The Internet and widespread use of blogging, email, social media and e-commerce have foregrounded new, complex moral issues and dilemmas. Likewise, modern technologies and social networks have brought numerous challenges to legal systems, which have difficulty keeping up with borderless global information technologies. The fully revised and updated Fifth Edition of Cyberethics: Morality and Law in Cyberspace offers an in-depth and comprehensive examination of the social costs and moral issues emerging from ever-expanding use of the Internet and new information technologies. Focusing heavily on content control, free speech, intellectual property, and security, Cyberethics: Morality and Law in Cyberspace provides legal and philosophical discussions of these critical issues.

The updated Fifth Edition includes new sections on Floridi’s Macroethics, gatekeepers and search engines, censorship, anti-piracy legislation, patents, and smartphones. Real-life case studies, including all-new examples focusing on Google, Facebook, video games, reader’s rights, and the Lulz Sec Hackers, provide real-world context. Ideal for undergraduate computer ethics courses as well as a general readership, Cyberethics is an excellent resource for students and laypeople alike.

Key Features: •Additional and revised content on P2P networks, hacktivists, cybercrime, a user's ability to control and monitor cookies in IE, mobilization data, online surveillance, threats posed by social networking, invasive commercial initiatives, Wikileaks, and more. •Examines the threat of the Internet on our privacy as consumers and employees, with a focus on covert information gathering, the use of "Cookies" and spyware. •End-of-chapter questions and case studies encourage critical thinking •Discusses the common ethical and public policy problems that have arisen and how technology or law would propose to solve these issues •Provides an unbiased review of Internet governance regulations

Managing Security and Compliance in Cloud or Virtualized Data Centers Using IBM PowerSC

IBM® PowerSC provides a security and compliance solution that is optimized for virtualized environments on IBM Power Systems™ servers, running IBM PowerVM® and IBM AIX®. Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure against ever evolving new threats. The IBM business-driven approach to enterprise security used in conjunction with solutions such as PowerSC makes IBM the premier security vendor in the market today. This IBM Redbooks® deliverable helps IT and Security managers, architects, and consultants to strengthen their security and compliance posture in a virtualized environment running IBM PowerVM.

Using Social Media for Global Security

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement! During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behavior/security professionals, Using Social Media for Global Security offers pages of instruction and detail on cutting-edge social media technologies, analyzing social media data, and building crowdsourcing platforms. The book teaches how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read. Illustrates linguistic, correlative, and network analysis of OSINT Examines using crowdsourcing technologies to work and engage with populations globally to solve security problems Explores how to ethically deal with social media data without compromising people's rights to privacy and freedom of expression Shows activists fighting against oppressive regimes how they can protect their identities online If you're responsible for maintaining local, national or global security, you'll want to read Using Social Media for Global Security.

IMS 12 Selected Performance Topics

IBM® Information Management System (IMS™) provides leadership in performance, reliability, and security to help you implement the most strategic and critical enterprise applications. IMS, IMS utilities, and IMS tools continue to evolve to provide value and meet the needs of enterprise customers. With IMS 12, integration and open access improvements provide flexibility and support business growth requirements. Scalability improvements have been made to the well-known performance, efficiency, availability, and resilience of IMS by using 64-bit storage. In this IBM Redbooks® publication we provide IMS performance monitoring and tuning information by describing the key IMS performance functions and by showing how to monitor and tune them with traditional and new strategic applications. This book is for database administrators and system programmers. We summarize methods and tools for monitoring and tuning IMS systems, describe IMS system-wide performance, database, and transaction considerations. Based on lab measurements, we provide information about recent performance enhancements that are available with IMS 12, and advice about setting performance-related parameters.

Logging and Log Management

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers. Comprehensive coverage of log management including analysis, visualization, reporting and more Includes information on different uses for logs -- from system operations to regulatory compliance Features case Studies on syslog-ng and actual real-world situations where logs came in handy in incident response Provides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation

IBM zEnterprise EC12 Technical Introduction

In a smarter planet, information-centric processes are exploding in growth. The mainframe has always been the IT industry's leading platform for transaction processing, consolidated and secure data serving, and support for available enterprise-wide applications. IBM® has extended the mainframe platform to help large enterprises reshape their client experiences through information-centric computing and to deliver on key business initiatives. IBM zEnterprise® is recognized as the most reliable and trusted system, and the most secure environment for core business operations. The new zEnterprise System consists of the IBM zEnterprise EC12 (zEC12), an updated IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension (zBX) Model 003. This IBM Redbooks® publication describes the zEC12, with its improved scalability, performance, security, resiliency, availability, and virtualization. The zEC12 has no peer as a trusted platform that also provides the most efficient transaction processing and database management. With efficiency at scale delivering significant cost savings on core processes, resources can be freed up to focus on developing new services to drive growth. This book provides a technical overview of the zEC12, zBX Model 003, and Unified Resource Manager. This publication is intended for IT managers, architects, consultants, and anyone else who wants to understand the elements of the zEnterprise System. For this introduction to the zEC12, readers are not expected to be familiar with current IBM System z® technology and terminology.

Pro SQL Database for Windows Azure: SQL Server in the Cloud, Second Edition

Pro SQL Database for Windows Azure, 2nd Edition shows how to create enterprise-level database deployments without the usual investment in datacenter and other infrastructure. Take advantage instead of Microsoft's worldwide backbone for cloud computing that delivers all the power of SQL Server in the form of the cloud-based SQL Database for Windows Azure. You can create and deploy a database in mere minutes that is accessible worldwide and takes advantage of SQL Database's high-availability features to protect your data while ensuring 99.9% uptime. SQL Azure is ideally suited for startups, who can benefit from instant access to a robust and secure web-accessible database platform for use in rapidly deploying new products to market. SQL Azure is also ideal for small and mid-sized businesses, giving them the same ability to deploy SQL Server as any large enterprise, but without the management overhead. Even large enterprises find SQL Azure useful in creating failover environments, development environments, extra capacity to handle surges in demand, and more. Pro SQL Database for Windows Azure covers the very latest in Microsoft's fast-moving, cloud platform, showing how to program and administer it in a variety of cloud computing scenarios. You'll learn to program SQL Azure from ASP.NET, from WinForms, and from SQL Reporting Services. You'll learn to manage the platform by planning for scalability, troubleshooting performance issues, and implementing strong security. You'll learn the unique aspects of SQL Azure such as sharding and federation support that combine to place SQL Azure a step above and ahead of the competiton. Shows how to use SQL Azure from classic Windows applications, ASP.NET and Windows Communication Foundation Covers management, performance, scalability, and troubleshooting Addresses the all-important issue of securing your data Helps you properly design for high-performance in a cloud environment Helps you adopt the new Federations feature in SQL Azure What you'll learn Create and manage SQL Database for Windows Azure databases Access SQL Azure from WinForms, ASP.NET, Reporting Services, and more Optimize database design for Azure's distributed cloud platform Share data between databases using SQL Database's Data Synch Service Secure data from intrusion and unauthorized access Learn strategies for data migration and backup Who this book is for Pro SQL Database for Windows Azure, 2nd Edition is aimed at developers and database administrators desiring instant access to a fully-capable SQL Server database environment without the pain of sorting out and managing the physical infrastructure.

IBM InfoSphere Information Server Deployment Architectures

Typical deployment architectures introduce challenges to fully using the shared metadata platform across products, environments, and servers. Data privacy and information security requirements add even more levels of complexity. IBM® InfoSphere® Information Server provides a comprehensive, metadata-driven platform for delivering trusted information across heterogeneous systems. This IBM Redbooks® publication presents guidelines and criteria for the successful deployment of InfoSphere Information Server components in typical logical infrastructure topologies that use shared metadata capabilities of the platform, and support development lifecycle, data privacy, information security, high availability, and performance requirements. This book can help you evaluate information requirements to determine an appropriate deployment architecture, based on guidelines that are presented here, and that can fulfill specific use cases. It can also help you effectively use the functionality of your Information Server product modules and components to successfully achieve your business goals. This book is for IT architects, information management and integration specialists, and system administrators who are responsible for delivering the full suite of information integration capabilities of InfoSphere Information Server.

Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices Edition is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release management, auditing, and other issues—the book helps you deliver the most value for your company's investment in Microsoft's flagship database system Goes beyond the manual to cover good techniques and best practices Delivers knowledge usually gained only by hard experience Focuses upon performance, scalability, reliability Helps achieve the predictability needed to be in control at all times What you'll learn Migrate to the new Extended Events framework for troubleshooting performance problems Automate the tracking of key performance indicators such as available disk space, cpu utilization, index fragmentation, and more Design performance into your database and its applications from the very beginning Manage staged releases from development to test through to production Diagnose resource and performance problems via dynamic management views Analyze I/O patterns and plan reliably to obtain the performance you need Who this book is for Pro SQL Server 2012 Practices is aimed at SQL Server professionals who want to further their careers through expert-level practices in performance management, scalability, predictability, and security.

Oracle 11g Anti-hacker's Cookbook

Oracle 11g Anti-hacker's Cookbook is your comprehensive guide to fortify your Oracle database against potential threats. Through over fifty practical recipes, you'll discover proven methodologies for protecting sensitive data and implementing advanced security measures featured in Oracle 11g R2. This book is essential for mastering robust database security practices. What this Book will help me do Effectively configure secure servers and operating systems for Oracle Database setups. Implement encryption using Oracle Cryptographic API and Transparent Data Encryption to secure sensitive data. Develop and deploy a thorough audit strategy utilizing Oracle's built-in auditing tools. Leverage Oracle Vault and Virtual Private Database (VPD) to control access and protect data. Recognize and defend against database attacks, including man-in-the-middle, sniffing, and brute-force scenarios. Author(s) Adrian Neagu is a seasoned Oracle Database expert with extensive experience in database security and performance tuning. He has spent years implementing, securing, and enhancing database systems for organizations all over the world. Adrian is passionate about educating others and distills complex security concepts into straightforward, actionable advice in this book. Who is it for? This book is ideal for Oracle Database Administrators, Security Managers, and Auditors who aim to enhance the security of their Oracle systems and protect sensitive data from threats. If you have a fundamental understanding of database operations and security principles, this book will guide you toward advanced proficiency. It is particularly invaluable for professionals dedicated to preventing unauthorized access and safeguarding data integrity.

Microsoft SQL Server 2012 Master Data Services 2/E, 2nd Edition

Deploy and Maintain an Integrated MDS Architecture Harness your master data and grow revenue while reducing administrative costs. Thoroughly revised to cover the latest MDS features, Microsoft SQL Server 2012 Master Data Services, Second Edition shows how to implement and manage a centralized, customer-focused MDS framework. See how to accurately model business processes, load and cleanse data, enforce business rules, eliminate redundancies, and publish data to external systems. Security, SOA and Web services, and legacy data integration are also covered in this practical guide. Install Microsoft SQL Server 2012 Master Data Services Build custom MDS models and entityspecific staging tables Load and cleanse data from disparate sources Logically group assets into collections and hierarchies Ensure integrity using versioning and business rules Configure security at functional, object, and attribute levels Extend functionality with SOA and Web services Facilitate collaboration using the MDS Excel Add-In Export data to subscribing systems through SQL views

IBM PowerVM Best Practices

This IBM® Redbooks® publication provides best practices for planning, installing, maintaining, and monitoring the IBM PowerVM® Enterprise Edition virtualization features on IBM POWER7® processor technology-based servers. PowerVM is a combination of hardware, PowerVM Hypervisor, and software, which includes other virtualization features, such as the Virtual I/O Server. This publication is intended for experienced IT specialists and IT architects who want to learn about PowerVM best practices, and focuses on the following topics: Planning and general best practices Installation, migration, and configuration Administration and maintenance Storage and networking Performance monitoring Security PowerVM advanced features

IBM Business Process Manager Security: Concepts and Guidance

This IBM® Redbooks® publication provides information about security concerning an organization’s business process management (BPM) program, about common security holes that often occur in this field, and describes techniques for rectifying these holes. This book documents preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured BPM installation. Many of the practices described in this book apply equally to generic Java Platform and Enterprise Edition (J2EE) applications, as well as to BPM. However, it focuses on aspects that typically do not receive adequate consideration in actual practice. Also, it addresses equally the BPM Standard and BPM Advanced Editions, although there are topics inherent in BPM Advanced that we considered to be out of scope for this book. This book is not meant as a technical deep-dive into any one topic, technology, or philosophy. IBM offers a variety of training and consulting services that can help you to understand and evaluate the implications of this book’s topic in your own organization.

Microsoft® SQL Server 2012 Management and Administration, Second Edition

If you need to deploy, manage, or secure Microsoft SQL Server 2012, this is the complete, fast-paced, task-based reference you’ve been searching for. Authored by a worldclass expert on running SQL Server in the enterprise, this book goes far beyond the basics, taking on the complex tasks that DBAs need to make the most of Microsoft’s first cloud-enabled database platform. Designed for maximum practical usability, it’s packed with expert tips and up-to-date real-world configuration guidance you simply won’t find anywhere else. As someone who helped influence the design of SQL Server 2012 and drawing on many months of beta testing, Ross Mistry provides immediately usable solutions for installation and upgrades, management and monitoring, performance and availability, security, consolidation, virtualization, troubleshooting, and more. Mistry identifies new features and corresponding best practices in every chapter, helping you take full advantage of new SQL Server innovations ranging from private cloud support to AlwaysOn Availability Groups. Understand how to: Efficiently install or upgrade the SQL Server 2012 database engine Administer and configure database engine settings, storage, I/O, and partitioning Transfer data on-premise or to the cloud Manage and optimize indexes Learn how to consolidate, virtualize and optimize SQL Server for Private Clouds Harden and audit SQL Server 2012 environments Administer security and authorization, including new Contained Databases Encrypt data and communications Design and deploy new AlwaysOn high-availability and disaster recovery features Implement maintenance best practices, including Policy-Based Management

Microsoft® SQL Server® 2012 Integration Services

Build and manage data integration solutions with expert guidance from the Microsoft SQL Server Integration Services (SSIS) team. See best practices in action and dive deep into the SSIS engine, SSISDB catalog, and security features. Using the developer enhancements in SQL Server 2012 and the flexible SSIS toolset, you’ll handle complex data integration scenarios more efficiently—and acquire the skills you need to build comprehensive solutions. Discover how to: Use SSIS to extract, transform, and load data from multiple data sources Apply best practices to optimize package and project configuration and deployment Manage security settings in the SSISDB catalog and control package access Work with SSIS data quality features to profile, cleanse, and increase reliability Monitor, troubleshoot, and tune SSIS solutions with advanced features such as detailed views and data taps Load data incrementally to capture an easily consumable stream of insert, update, and delete activity

Unleashing DB2 10 for Linux, UNIX, and Windows

This IBM® Redbooks® publication provides a broad understanding of the key features in IBM DB2® 10 and how to use these features to get more value from business applications. It includes information about the following features: Time Travel Query, which you use to store and retrieve time-based data by using capability built into DB2 10, without needing to build your own solution Adaptive compression, an enhanced compression technology that adapts to changing data patterns, yielding extremely high compression ratios Multi-temperature storage, which you may use to optimize storage costs by identifying and managing data based on its “temperature” or access requirements Row and column access control, which offers security access enforcement on your data, at the row or column level, or both Availability enhancements, which provide different DB2 availability features for different enterprise needs; high availability disaster recovery (HADR) multiple-standby databases provide availability and data recovery in one technology, and the IBM DB2 pureScale® Feature provides continuous availability and scalability that is transparent to applications Oracle compatibility, which allows many applications written for Oracle to run on DB2, virtually unchanged Ingest utility, a feature-rich data movement utility that allows queries to run concurrently with minimal impact on data availability

Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges. In this IBM Redbooks® publication, we provide IT security professionals with a better understanding around the challenging topic of endpoint management in the IT security domain. We focus on IBM Tivoli Endpoint Manager for Security and Compliance and describe the product architecture and provide a hands-on design guide for deploying the solution. This book is a valuable resource for security professionals and architects who want to understand and implement a centralized endpoint management infrastructure and endpoint protection to better handle security and compliance challenges.

Securing SQL Server, 2nd Edition

SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book written by Denny Cherry, a Microsoft SQL MVP and one of the biggest names in SQL server today, readers learn how to properly secure a SQL server database from internal and external threats using best practices as well as specific tricks the authors employ in their roles as database administrators for some of the largest SQL server deployments in the world. "Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He's a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesn't work, he's speaking from experience. Active in the community, his passion is sharing. You'll enjoy this book."--Buck Woody, Senior Technology Specialist, Microsoft Presents hands-on techniques for protecting your SQL Server database from intrusion and attack Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali) Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs