talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

615

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

Showing filtered results

Filtering by: O'Reilly Data Engineering Books ×
Oracle 10g Developing Media Rich Applications

Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997, Oracle became the first commercial database with integrated multimedia technology for application developers. Since that time, Oracle has enhanced and extended these features to include native support for image, audio, video and streaming media storage; indexing, retrieval and processing in the Oracle Database, Application Server; and development tools. Databases are not only words and numbers for accountants, but they also should utilize a full range of media to satisfy customer needs, from race car engineers, to manufacturing processes to security. The full range of audio, video and integration of media into databases is mission critical to these applications. This book details the most recent features in Oracle’s multimedia technology including those of the Oracle10gR2 Database and the Oracle9i Application Server. The technology covered includes: object relational media storage and services within the database, middle tier application development interfaces, wireless delivery mechanisms, and Java-based tools. * Gives broad coverage to integration of multimedia features such as audio and instrumentation video, from race cars to analyze performance, to voice and picture recognition for security data bases. As well as full multimedia for presentations * Includes field tested examples in enterprise environments * Provides coverage in a thorough and clear fashion developed in a London University Professional Course

SQL All-in-One For Dummies®, 2nd Edition

The soup-to-nuts guide on all things SQL! SQL, or structured query language, is the international standard language for creating and maintaining relational databases. It is the basis of all major databases in use today and is essential for the storage and retrieval of database information. This fun and friendly guide takes SQL and all its related topics and breaks it down into easily digestible pieces for you to understand. You'll get the goods on relational database design, development, and maintenance, enabling you to start working with SQL right away! Provides an overview of the SQL language and examines how it is integral for the storage and retrieval of database information Includes updates to SQL standards as well as any new features Explores SQL concepts, relational database development, SQL queries, data security, database tuning, and more Addresses the relationship between SQL and programming as well as SQL and XML If you're looking for an up-to-date sequel to the bestelling first edition of SQL All-in-One For Dummies, then this is the book for you!

Microsoft SQL Server 2008 R2 Master Data Services

Best Practices for Deploying and Managing Master Data Services (MDS) Effectively manage master data and drive better decision making across your enterprise with detailed instruction from two MDS experts. Microsoft SQL Server 2008 R2 Master Data Services Implementation & Administration shows you how to use MDS to centralize the management of key data within your organization. Find out how to build an MDS model, establish hierarchies, govern data access, and enforce business rules. Legacy system integration and security are also covered. Real-world programming examples illustrate the material presented in this comprehensive guide. Create a process-agnostic solution for managing your business domains Learn how to take advantage of the data modeling capabilities of MDS Manage hierarchies and consolidations across your organization Import data by using SQL Server Integration Services and T-SQL statements Ensure data accuracy and completeness by using business rules and versioning Employ role-based security at functional, object, and attribute levels Design export views and publish data to subscribing systems Use Web services to progrmmatically interact with your implementation

IBM System Storage b-type Multiprotocol Routing: An Introduction and Implementation

The rapid spread and adoption of production storage area networks (SANs) has fueled the need for multiprotocol routers. The routers provide improved scalability, security, and manageability by enabling devices in separate SAN fabrics to communicate without merging fabrics into a single, large SAN fabric. This capability enables clients to initially deploy separate SAN solutions at the departmental and data center levels. Then, clients can consolidate these separate solutions into large enterprise SAN solutions as their experience and requirements grow and change. Alternatively, multiprotocol routers can help to connect existing enterprise SANs for a variety of reasons. For instance, the introduction of Small Computer System Interface over IP (iSCSI) provides for the connection of low-end, low-cost hosts to enterprise SANs. The use of an Internet Protocol (IP) in the Fibre Channel (FC) environment provides for resource consolidation and disaster recovery planning over long distances. And the use of FC-FC routing services provides connectivity between two or more fabrics without having to merge them into a single SAN. This IBM® Redbooks® publication targets storage network administrators, system designers, architects, and IT professionals who sell, design, or administer SANs. It introduces you to products, concepts, and technology in the IBM System Storage™ SAN Routing portfolio, which is based on Brocade products and technology. This book shows the features of these products and examples of how you can deploy and use them.

Tivoli Integration Scenarios

This IBM® Redbooks® publication provides a broad view of how Tivoli® system management products work together in several common scenarios. You must achieve seamless integration for operations personnel to work with the solution. This integration is necessary to ensure that the product can be used easily by the users. Product integration contains multiple dimensions, such as security, navigation, data and task integrations. Within the context of the scenarios in this book, you see examples of these integrations. The scenarios implemented in this book are largely based on the input from the integration team, and several clients using IBM products. We based these scenarios on common real-life examples that IT operations often have to deal with. Of course, these scenarios are only a small subset of the possible integration scenarios that can be accomplished by the Tivoli products, but they were chosen to be representative of the integration possibilities using the Tivoli products. We discuss these implementations and benefits that are realized by these integrations, and also provide sample scenarios of how these integrations work. This book is a reference guide for IT architects and IT specialists working on integrating Tivoli products in real-life environments.

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security. Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities. Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.

Securing SQL Server

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits. Named a 2011 Systems Administration Book by InfoSec Reviews Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged

Pro SQL Azure

SQL Azure represents Microsoft's cloud-based delivery of its enterprise-caliber, SQL Server database management system (formerly under the code name "Oslo"). Pro SQL Azure introduces you to this new platform, showing you how to program and administer it in a variety of cloud computing scenarios. You'll learn to program SQL Azure from Silverlight, ASP.NET, WinForms, and from SQL Reporting Services. You'll also understand how to manage the platform by planning for scalability, troubleshooting performance issues, and implementing strong security. Shows how to use SQL Azure from Silverlight, ASP.NET, and more Covers management, scalability, and troubleshooting Addresses the all-important issue of securing your data

Legal Issues in Information Security

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!

Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. Part 1 of this book discusses fundamental security and privacy concepts. Part 2 examines recent US laws that address information security and privacy. And Part 3 considers security and privacy for organizations.

Oracle Database Administration for Microsoft SQL Server DBAs

Apply Your SQL Server DBA Skills to Oracle Database Administration Use your SQL Server experience to set up and maintain a high-performance Oracle Database environment. Written by a DBA with expertise in both platforms, Oracle Database Administration for Microsoft SQL Server DBAs illustrates each technique with clear explanations, examples, and comparison tables. Get full details on Oracle Database intervals, creation assistants, management techniques, and query tools. High availability, disaster recovery, and security procedures are also extensively covered in this comprehensive Oracle Press guide. Install and configure Oracle Database on Windows or Linux systems Administer and monitor databases from Oracle Enterprise Manager Implement robust security using roles, permissions, and privileges Back up and restore databases with Oracle Recovery Manager Use the Oracle cost-based optimizer to tune performance Write, debug, and execute PL/SQL queries using Oracle SQL Developer Maximize availability with Oracle Real Application Clusters Build standby and failover servers using Oracle Data Guard

MongoDB: The Definitive Guide

How does MongoDB help you manage a huMONGOus amount of data collected through your web application? With this authoritative introduction, you'll learn the many advantages of using document-oriented databases, and discover why MongoDB is a reliable, high-performance system that allows for almost infinite horizontal scalability. Written by engineers from 10gen, the company that develops and supports this open source database, MongoDB: The Definitive Guide provides guidance for database developers, advanced configuration for system administrators, and an overview of the concepts and use cases for other people on your project. Learn how easy it is to handle data as self-contained JSON-style documents, rather than as records in a relational database. Explore ways that document-oriented storage will work for your project Learn how MongoDB’s schema-free data model handles documents, collections, and multiple databases Execute basic write operations, and create complex queries to find data with any criteria Use indexes, aggregation tools, and other advanced query techniques Learn about monitoring, security and authentication, backup and repair, and more Set up master-slave and automatic failover replication in MongoDB Use sharding to scale MongoDB horizontally, and learn how it impacts applications Get example applications written in Java, PHP, Python, and Ruby

Microsoft® Access® 2010 Programmer's Reference

A comprehensive guide to programming for Access 2010 and 2007 Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic. Access 2010 Programmer's Reference is a comprehensive guide to the best-of-breed techniques for programming Access applications. Coverage Includes: Introduction to Microsoft Access 2010 New Features Upgrading and Converting to Access 2010 Macros in Access 2010 Using the VBA Editor VBA Basics Using VBA in Access Creating Classes in VBA Extending VBA with APIs Working with the Windows Registry Using DAO to Access Data Using ADO to Access Data Using SQL with VBA Using VBA to Enhance Forms Enhancing Reports with VBA Customizing the Ribbon Customizing the Office Backstage Working with Office 2010 Working with SharePoint Working with .NET Building Client-Server Applications with Access The Access 2010 Templates Access Runtime Deployment Database Security Access 2010 Security Features

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing $300,000 and his business to data breach, John writes about the risks posed by social media, travel theft, workplace identity theft, and how to keep it from happening to you and your business. By interlacing his personal experience with cutting-edge research and unforgettable stories, John not only inspires change inside of your organization, but outlines a simple framework with which to build a Culture of Privacy. This book is a must-read for any individual with a Social Security Number and any business leader who doesn't want the negative publicity, customer flight, legal battles and stock depreciation resulting from data breach. Protect your net worth and bottom line using the 7 Mindsets of a Spy Accumulate Layers of Privacy Eliminate the Source Destroy Data Risk Lock Your Assets Evaluate the Offer Interrogate the Enemy Monitor the Signs In this revised edition, John includes an 8th Mindset, Adaptation, which serves as an additional bridge between personal protection and bulletproofing your organization. Privacy Means Profit offers a one-stop guide to protecting what's most important and most at risk-your essential business and personal data.

Information Assurance

In today’s fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA). The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance Additional focus on security and survivability issues in wireless networks

SQL Server® 2008 Administration: Real World Skills for MCITP Certification and Beyond

The ideal on-the-job reference guide for SQL Server 2008 database administrators If you manage and administer SQL Server 2008 in the real world, you need this detailed guide at your desk. From planning to disaster recovery, this practical book explores tasks and scenarios that a working SQL Server DBA faces regularly and shows you step by step how to handle them. Topics include installation and configuration, creating databases and tables, optimizing the database server, planning for high availability, and more. And, if you're preparing for MCTS or MCITP certification in SQL Server 2008 administration, this book is the perfect supplement to your preparation, featuring a CD with practice exams, flashcards, and video walkthroughs of the more difficult administrative tasks Delves into Microsoft's SQL Server 2008, a rich set of enterprise-level database services for business-critical applications Explores the skills you'll need on the job as a SQL Server 2008 administrator Shows you how to implement, maintain, and repair the SQL Server database, including bonus videos on the CD where the authors walks you through the more difficult tasks Covers database design, installation and configuration, creating databases and tables, security, backup and high availability, and more Supplements your preparation for MCTS and MCITP SQL Server 2008 certification with in-depth coverage of the skill sets required for certification, as defined by Microsoft Uses hands-on exercises and real-world scenarios to keep what you're learning grounded in the reality of the workplace Make sure you're not only prepared for certification, but also for your job as a SQL Server 2008 administrator, with this practical reference! Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Private Security and the Investigative Process, 3rd Edition

Detailing best practices and trade secrets for private sector security investigations, Private Security and the Investigative Process, Third Edition provides complete coverage of the investigative process. Fully updated, this edition covers emerging technology, revised legal and practical considerations for conducting interviews, and new information on case evaluation. Written by a recognized expert in security, criminal justice, ethics, and the law-with over three decades of experience-the updated edition of this popular text covers concepts and techniques that can be applied to a variety of investigations including fraud, insurance, private, and criminal. It details the collection and preservation of evidence, the handling of witnesses, surveillance techniques, background investigations, and report writing. This new edition includes: More than 80 new or updated forms, checklists, charts, and illustrations Updated proprietary information from Pinkerton, Wackenhut, and other leading security companies Increased emphasis on software and technological support products A closer examination of periodical literature and government publications Authoritative, yet accessible, this book is an important reference for private investigators and security professionals. Complete with numerous forms, checklists, and web exercises, it provides the tools and understanding required to conduct investigations that are professional, ethical, and effective.

Oracle WebCenter 11g Handbook

Master Oracle WebCenter 11 g Transform your organization into a personalized, user-focused workplace using the detailed information in this comprehensive Oracle Press guide. Oracle WebCenter 11g Handbook shows you how to build Enterprise 2.0 applications that facilitate collaboration and foster innovation. You'll work with task flows and content systems, employ social networking tools, develop portals and composite applications, and deploy runtime customization. Debugging, security, and application tuning are also covered in this practical resource. Develop, test, and deploy dynamic enterprise applications, portals, and portlets Design data-backed rich Internet applications using Oracle JDeveloper 11 g and Oracle WebLogic Server Work with Oracle Content Server and Oracle Secure Enterprise Search Customize applications at runtime using Oracle Composer and metadata services Use the resource catalog to deliver personalized search results to end users Integrate RSS feeds, forums, wikis, and blogs with Oracle WebCenter social computing services Implement the latest Oracle Application Development Framework security tools Extend functionality using mashups, composite applications, and third-party add-ons Understand the Web 2.0 and portal technologies behind Oracle Fusion Applications For a complete list of Oracle Press titles, visit www.OraclePressBooks.com

Developing Applications with IBM FileNet P8 APIs

This IBM® Redbooks® publication can help you develop content and process management applications with IBM FileNet® APIs. The IBM FileNet P8 suite of products contains a set of robust APIs that range from core platform APIs to supporting application APIs. This book focuses specifically on Content Engine and Process Engine APIs. Content Engine API topics that we discuss include creating, retrieving, updating, and deleting objects; querying and viewing documents; and batching and batch execution. We also explore more complex topics, including permissions and authorization, versioning, relationships, annotations, workflow subscriptions and event actions, metadata discovery, and dynamic security inheritance. Process Engine API topics that we discuss include launching a workflow, searching for and processing work items, and working with process status. The more complex topics we cover include, Component Integrator application space, role, workbasket, resource navigation in Process Engine REST API, ECM Widgets, and building a custom Get Next In-basket widget. To help you better understand programming with IBM FileNet APIs, we provide a sample application implemented for a fictional company. We include the data model, security model, workflows, and various applications developed for the sample. You can download them for your reference. This book is intended for IBM FileNet P8 application developers. We recommend using this book in conjunction with the online ECM help.

Applied Oracle Security: Developing Secure Database and Middleware Environments

Cutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.

SQL Server® 2008 Administration: Instant Reference

Perfect companion to any SQL Server 2008 book, providing fast, accurate answers on the spot for millions of IT professionals System and database administrators, IT consultants, and database application developers often need quick answers and practical solutions for SQL Server issues. This convenient guide offers you quick referencing for the product and database topics you need most. If you're an IT administrator looking for the essentials in the day-to-day tasks of administering SQL Server 2008, you'll appreciate this book's design for providing quick and easy look up of solutions and tables, lists, and step-by-step instructions for answers on the spot. SQL Server 2008 Instant Administration Reference is a guide that you want to keep within reach. SQL Server is Microsoft's bestselling database manager; the 2008 version offers enhanced security and high availability, encouraging users to upgrade Features thumb tabs, secondary and tertiary tables of contents, and special heading treatments to provide quick and easy lookup, as well as quick-reference tables and lists to provide answers on the spot Covers installing, configuring, managing, and maintaining SQL Server; optimizing server performance; and troubleshooting SQL Server 2008 Administration Instant Reference answers the questions you encounter most often in your daily work.