talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

Advanced Analytics with Spark

In this practical book, four Cloudera data scientists present a set of self-contained patterns for performing large-scale data analysis with Spark. The authors bring Spark, statistical methods, and real-world data sets together to teach you how to approach analytics problems by example. You’ll start with an introduction to Spark and its ecosystem, and then dive into patterns that apply common techniques—classification, collaborative filtering, and anomaly detection among others—to fields such as genomics, security, and finance. If you have an entry-level understanding of machine learning and statistics, and you program in Java, Python, or Scala, you’ll find these patterns useful for working on your own data applications.

PostgreSQL for Data Architects

Dive into the world of scalable and maintainable PostgreSQL databases with 'PostgreSQL for Data Architects.' This book is your companion to mastering PostgreSQL and learning how to configure, optimize, and manage database systems effectively. Whether you are designing a new database or maintaining and improving an existing one, you'll find practical tips and techniques tailored for data-intensive applications. What this Book will help me do Master PostgreSQL architecture, compilation, and configuration for custom setups. Optimize database performance with advanced indexing, query tuning, and parameter adjustments. Leverage replication to scale databases horizontally and ensure high availability. Set up robust backup and recovery processes to secure and manage data effectively. Troubleshoot effectively using PostgreSQL's tools and logging mechanisms to resolve issues promptly. Author(s) Jayadevan M is a seasoned data architect with years of experience working on database design and optimization for diverse applications. His expertise spans various database management systems with a focus on practical, performance-oriented solutions. Through his writing, Jayadevan aims to make sophisticated database concepts accessible to developers seeking to advance their skills and build resilient, scalable systems. Who is it for? This book is perfect for developers and data architects who already have a basic understanding of database structures, such as tables and security configurations, looking to deepen their PostgreSQL skills. If your goal is to design, manage, or optimize database applications with PostgreSQL effectively, this guide will act as a vital resource. Additionally, those involved in performance tuning or database scalability projects will find it invaluable.

Centrally Managing Access to Self-Encrypting Drives in Lenovo System x Servers Using IBM Security Key Lifecycle Manager

Data security is one of the paramount requirements for organizations of all sizes. Although many companies invested heavily in protection from network-based attacks and other threats, few effective safeguards are available to protect against potentially costly exposures of proprietary data that results from a hard disk drive being stolen, misplaced, retired, or redeployed. Self-encrypting drives (SEDs) can satisfy this need by providing the ultimate in security for data-at-rest and can help reduce IT drive retirement costs in the data center. Self-encrypting drives are also an excellent choice if you must comply with government or industry regulations for data privacy and encryption. To effectively manage a large deployment of SEDs in Lenovo® System x® servers, an organization must rely on a centralized key management solution. This IBM Redbooks® publication explains the technology behind SEDs and demonstrates how to deploy a key management solution that uses IBM Security Key Lifecycle Manager and properly setup your System x servers.

Knowledge Discovery Process and Methods to Enhance Organizational Performance

Although the terms "data mining" and "knowledge discovery and data mining" (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process. Data mining is the process of extracting useful information from data, while KDDM is the coordinated process of understanding the business and mining the data in order to identify previously unknown patterns. Knowledge Discovery Process and Methods to Enhance Organizational Performance explains the knowledge discovery and data mining (KDDM) process in a manner that makes it easy for readers to implement. Sharing the insights of international KDDM experts, it details powerful strategies, models, and techniques for managing the full cycle of knowledge discovery projects. The book supplies a process-centric view of how to implement successful data mining projects through the use of the KDDM process. It discusses the implications of data mining including security, privacy, ethical and legal considerations. Provides an introduction to KDDM, including the various models adopted in academia and industry Details critical success factors for KDDM projects as well as the impact of poor quality data or inaccessibility to data on KDDM projects Proposes the use of hybrid approaches that couple data mining with other analytic techniques (e.g., data envelopment analysis, cluster analysis, and neural networks) to derive greater value and utility Demonstrates the applicability of the KDDM process beyond analytics Shares experiences of implementing and applying various stages of the KDDM process in organizations The book includes case study examples of KDDM applications in business and government. After reading this book, you will understand the critical success factors required to develop robust data mining objectives that are in alignment with your organization’s strategic business objectives.

Field Guide to Hadoop

If your organization is about to enter the world of big data, you not only need to decide whether Apache Hadoop is the right platform to use, but also which of its many components are best suited to your task. This field guide makes the exercise manageable by breaking down the Hadoop ecosystem into short, digestible sections. You’ll quickly understand how Hadoop’s projects, subprojects, and related technologies work together. Each chapter introduces a different topic—such as core technologies or data transfer—and explains why certain components may or may not be useful for particular needs. When it comes to data, Hadoop is a whole new ballgame, but with this handy reference, you’ll have a good grasp of the playing field. Topics include: Core technologies—Hadoop Distributed File System (HDFS), MapReduce, YARN, and Spark Database and data management—Cassandra, HBase, MongoDB, and Hive Serialization—Avro, JSON, and Parquet Management and monitoring—Puppet, Chef, Zookeeper, and Oozie Analytic helpers—Pig, Mahout, and MLLib Data transfer—Scoop, Flume, distcp, and Storm Security, access control, auditing—Sentry, Kerberos, and Knox Cloud computing and virtualization—Serengeti, Docker, and Whirr

Apache Hive Essentials

Apache Hive Essentials is the perfect guide for understanding and mastering Hive, the SQL-like big data query language built on top of Hadoop. With this book, you will gain the skills to effectively use Hive to analyze and manage large data sets. Whether you're a developer, data analyst, or just curious about big data, this hands-on guide will enhance your capabilities. What this Book will help me do Understand the core concepts of Hive and its relation to big data and Hadoop. Learn how to set up a Hive environment and integrate it with Hadoop. Master the SQL-like query functionalities of Hive to select, manipulate, and analyze data. Develop custom functions in Hive to extend its functionality for your own specific use cases. Discover best practices for optimizing Hive performance and ensuring data security. Author(s) Dayong Du is an expert in big data analytics with extensive experience in implementing and using tools like Hive in professional settings. Having worked on practical big data solutions, Dayong brings a wealth of knowledge and insights to his writing. His clear, approachable style makes complex topics accessible to readers. Who is it for? This book is ideal for developers, data analysts, and data engineers looking to leverage Hive for big data analysis. If you are familiar with SQL and Hadoop basics and aim to enhance your understanding of Hive, this book is for you. Beginners with some programming background eager to dive into big data technologies will also benefit. It's tailored for learners wanting actionable knowledge to advance their data processing skills.

IBM Tape Library Guide for Open Systems

This IBM® Redbooks® publication presents a general introduction to Linear Tape-Open (LTO) technology and the implementation of corresponding IBM products. The high-performance, high-capacity, and cost-effective IBM TS1150 tape drive is included. The book highlights the IBM TS4500 tape library, which is the next-generation storage solution that is designed to help midsize and large enterprises respond to storage challenges. The IBM TS1150 tape drive gives organizations an easy way to deliver fast access to data, improve security, and provide long-term retention for less expense than disk solutions. TS1150 offers high-performance, flexible data storage with support for data encryption. This fifth-generation drive can help protect investments in tape automation by offering compatibility with existing automation. This eleventh edition includes information about the latest enhancements to the IBM Ultrium family of tape drives and tape libraries. In particular, it includes details of the latest IBM LTO Ultrium 6 tape drive technology and its implementation in IBM tape libraries. It contains technical information about each IBM tape product for open systems and includes generalized sections about Small Computer System Interface (SCSI) and Fibre Channel connections and multipath architecture configurations. This edition also includes details about Tape System Library Manager (TSLM), which consolidates and simplifies large TS3500 tape library environments, including the IBM Shuttle Complex. This book also covers tools and techniques for library management. It is intended for anyone who wants to understand more about IBM tape products and their implementation. It is suitable for IBM clients, IBM Business Partners, IBM specialist sales representatives, and technical specialists. If you do not have a background in computer tape storage products, you might need to read other sources of information. In the interest of being concise, topics that are generally understood are not covered in detail.

Extending IBM Business Process Manager to the Mobile Enterprise with IBM Worklight

In today's business in motion environments, workers expect to be connected to their critical business processes while on-the-go. It is imperative to deliver more meaningful user engagements by extending business processes to the mobile working environments. This IBM® Redbooks® publication provides an overview of the market forces that push organizations to reinvent their process with Mobile in mind. It describes IBM Mobile Smarter Process and explains how the capabilities provided by the offering help organizations to mobile-enable their processes. This book outlines an approach that organizations can use to identify where within the organization mobile technologies can offer the greatest benefits. It provides a high-level overview of the IBM Business Process Manager and IBM Worklight® features that can be leveraged to mobile-enable processes and accelerate the adoption of mobile technologies, improving time-to-value. Key IBM Worklight and IBM Business Process Manager capabilities are showcased in the examples included in this book. The examples show how to integrate with IBM Bluemix™ as the platform to implement various supporting processes. This IBM Redbooks publication discusses architectural patterns for exposing business processes to mobile environments. It includes an overview of the IBM MobileFirst reference architecture and deployment considerations. Through use cases and usage scenarios, this book explains how to build and deliver a business process using IBM Business Process Manager and how to develop a mobile app that enables remote users to interact with the business process while on-the-go, using the IBM Worklight Platform. The target audience for this book consists of solution architects, developers, and technical consultants who will learn the following information: What is IBM Mobile Smarter Process Patterns and benefits of a mobile-enabled Smarter Process IBM BPM features to mobile-enable processes IBM Worklight features to mobile-enable processes Mobile architecture and deployment topology IBM BPM interaction patterns Enterprise mobile security with IBM Security Access Manager and IBM Worklight Implementing mobile apps to mobile-enabled business processes

Extend Microsoft Access Applications to the Cloud

Learn how to create an Access web app, and move your database into the cloud. This practical book shows you how to design an Access web app for Microsoft Office 365, and convert existing Access desktop databases to a web app as well. You’ll quickly learn your way around the web app design environment, including how to capitalize on its strengths and avoid the pitfalls. You don’t need any special web skills to get started. Discover how to: Make your desktop database compatible with web app table structures Create tables, views, and queries Customize the table selector and work with popup views to provide a navigation interface Implement business rules using the Macro Programming Tools Develop using Office 365 and SharePoint 2013 Use SQL Azure to investigate how your web app is structured Design, test, and troubleshoot Data Macros Understand how security links between a web app and Office 365 Deploy a public facing web app on your Office 365 public website

Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data

Wring more out of the data with a scientific approach to analysis Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the discovery of new business insights and opportunities. Published in full color, the book describes the process of creating powerful visualizations using a rich and engaging set of examples from sports, finance, marketing, security, social media, and more. You will find practical guidance toward pattern identification and using various data sources, including Big Data, plus clear instruction on the use of software and programming. The companion website offers data sets, full code examples in Python, and links to all the tools covered in the book. Science has already reaped the benefit of network and graph theory, which has powered breakthroughs in physics, economics, genetics, and more. This book brings those proven techniques into the world of business, finance, strategy, and design, helping extract more information from data and better communicate the results to decision-makers. Study graphical examples of networks using clear and insightful visualizations Analyze specifically-curated, easy-to-use data sets from various industries Learn the software tools and programming languages that extract insights from data Code examples using the popular Python programming language There is a tremendous body of scientific work on network and graph theory, but very little of it directly applies to analyst functions outside of the core sciences - until now. Written for those seeking empirically based, systematic analysis methods and powerful tools that apply outside the lab, Graph Analysis and Visualization is a thorough, authoritative resource.

Data Privacy for the Smart Grid

Privacy for the Smart Grid provides easy-to-understand guidance on data privacy issues and the implications for creating privacy risk management programs, along with privacy policies and practices required to ensure Smart Grid privacy. It addresses privacy in electric, natural gas, and water grids from two different perspectives of the topic, one from a Smart Grid expert and another from a privacy and information security expert. While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine applications.

Oracle Database 12c Security

Best Practices for Comprehensive Oracle Database Security Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples. Connect users to databases in a secure manner Manage identity, authentication, and access control Implement database application security Provide security policies across enterprise applications using Real Application Security Control data access with Oracle Virtual Private Database Control sensitive data using data redaction and transparent sensitive data protection Control data access with Oracle Label Security Use Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threats Implement auditing technologies, including Unified Audit Trail Manage security policies and monitor a secure database environment with Oracle Enterprise Manager Cloud Control

Enhanced Networking on IBM z/VSE

The importance of modern computer networks is steadily growing as increasing amounts of data are exchanged over company intranets and the Internet. Understanding current networking technologies and communication protocols that are available for the IBM® mainframe and System z® operating systems is essential for setting up your network infrastructure with IBM z/VSE®. This IBM Redbooks® publication helps you install, tailor, and configure new networking options for z/VSE that are available with TCP/IP for VSE/ESA, IPv6/VSE, and Fast Path to Linux on System z (Linux Fast Path). We put a strong focus on network security and describe how the new OpenSSL-based SSL runtime component can be used to enhance the security of your business. This IBM Redbooks publication extends the information that is provided in Security on IBM z/VSE, SG24-7691.

Mastering Hadoop

Embark on a journey to master Hadoop and its advanced features with this comprehensive book. "Mastering Hadoop" equips you with the knowledge needed to tackle complex data processing challenges and optimize your Hadoop workflows. With clear explanations and practical examples, this book is your guide to becoming proficient in leveraging Hadoop technologies. What this Book will help me do Optimize Hadoop MapReduce jobs, Pig scripts, and Hive queries for better performance. Understand and employ advanced data formats and Hadoop I/O techniques. Learn to integrate low-latency processing with Storm on YARN. Explore the cloud deployment of Hadoop and advanced HDFS alternatives. Enhance Hadoop security and master techniques for analytics using Hadoop. Author(s) None Karanth is an experienced Hadoop professional with years of expertise in data processing and distributed computing. With a practical and methodical approach, None has crafted this book to empower learners with the essentials and advanced features of Hadoop. None's focus on performance optimization and real-world applications helps bridge the gap between theory and practice. Who is it for? This book is ideal for data engineers and software developers familiar with the basics of Hadoop who seek to advance their understanding. If you aim to enhance Hadoop performance or adopt new features like YARN and Storm, this book is for you. Readers interested in Hadoop deployment, optimization, and newer capabilities will also greatly benefit. It's perfect for anyone aiming to become a Hadoop expert, from intermediate learners to advanced practitioners.

A Software Architect's Guide to New Java Workloads in IBM CICS Transaction Server

This IBM® Redpaper Redbooks® publication introduces the IBM System z® New Application License Charges (zNALC) pricing structure and provides examples of zNALC workload scenarios. It describes the products that can be run on a zNALC logical partition (LPAR), reasons to consider such an implementation, and covers the following topics: Using the IBM WebSphere Application Server Liberty profile to host applications within an IBM CICS® environment and how it interacts with CICS applications and resources Security technologies available to applications that are hosted within a WebSphere Application Server Liberty profile in CICS How to implement modern presentation in CICS with a CICS Liberty Java virtual machine (JVM) server How to share scenarios to develop Liberty JVM applications to gain benefits from IBM CICS Transaction Server for IBM z/OS® Value Unit Edition Considerations when using mobile devices to interact with CICS applications and explains specific CICS technologies for connecting mobile devices by using the z/OS Value Unit Edition How IBM Operational Decision Manager for z/OS runs in the transaction server to provide decision management services for CICS COBOL and PL/I applications Installing the CICS Transaction Server for z/OS (CICS TS) Feature Pack for Modern Batch to enable the IBM WebSphere® batch environment to schedule and manage batch applications in CICS This book also covers what is commonly referred to as plain old Java objects (POJOs). The Java virtual machine (JVM) server is a full-fledged JVM that includes support for Open Service Gateway initiative (OSGi) bundles. It can be used to host open source Java frameworks and does just about anything you want to do with Java on the mainframe. POJO applications can also qualify for deployment using the Value Unit Edition. Read about how to configure and deploy them in this companion Redbooks publication: IBM CICS and the JVM server: Developing and Deploying Java Applications, SG24-8038 Examples of POJOs are terminal-initiated transactions, CICS web support, web services, requests received via IP CICS sockets, and messages coming in via IBM WebSphere MQ messaging software.

Big Data and Health Analytics

Data availability is surpassing existing paradigms for governing, managing, analyzing, and interpreting health data. Big Data and Health Analytics provides frameworks, use cases, and examples that illustrate the role of big data and analytics in modern health care, including how public health information can inform health delivery. Written for health care professionals and executives, this is not a technical book on the use of statistics and machine-learning algorithms for extracting knowledge out of data, nor a book on the intricacies of database design. Instead, this book presents the current thinking of academic and industry researchers and leaders from around the world. Using non-technical language, this book is accessible to health care professionals who might not have an IT and analytics background. It includes case studies that illustrate the business processes underlying the use of big data and health analytics to improve health care delivery. Highlighting lessons learned from the case studies, the book supplies readers with the foundation required for further specialized study in health analytics and data management. Coverage includes community health information, information visualization which offers interactive environments and analytic processes that support exploration of EHR data, the governance structure required to enable data analytics and use, federal regulations and the constraints they place on analytics, and information security. Links to websites, videos, articles, and other online content that expand and support the primary learning objectives for each major section of the book are also included to help you develop the skills you will need to achieve quality improvements in health care delivery through the effective use of data and analytics.

Practical Hadoop Security

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way. You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors. No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples. The book concludes with the most important aspect of Hadoop security – encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost. Practical Hadoop Security: Explains importance of security, auditing and encryption within a Hadoop installation Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use

IBM Tivoli Storage Productivity Center Beyond the Basics

You have installed and performed the basic customization of IBM® Tivoli® Storage Productivity Center. You have collected performance data collection and generated reports. Now it’s time to learn the best ways to use the software to manage your storage infrastructure. This IBM Redbooks® publication shows the best way to set up the software, based on your storage environment, and then how to use it to manage your infrastructure. It includes experiences from IBM clients and staff and covers the following topics: Architectural design techniques (sizing your environment, single versus multiple installations, physical versus virtual servers, deployment in a large, existing storage infrastructure) Database and server considerations (database backup and restoration methods and scripts, using IBM Data Studio Client for database administration, database placement and relocation, repository sizing and tuning, moving and migrating the server) Alerting, monitoring and reporting (monitoring thresholds and alerts, performance management and analysis of reports, real-time performance monitoring for IBM SAN Volume Controller) Security considerations (Tivoli Storage Productivity Center internal user IDs, user authentication configuration methods, how and why to set up and change passwords, configuring, querying, and testing LDAP and Microsoft Active Directory) Heath checks (server heath and logs, health and recoverability of IBM DB2® databases, using the Database Maintenance tool) Data management techniques (how to spot unusual growth incidents, scripted actions for Tivoli Storage manager and hierarchical storage management) This book is for storage administrators who are responsible for the performance and growth of the IT storage infrastructure.

Mastering Geoserver

Mastering GeoServer is your complete guide to deploying GeoServer for enterprise geospatial data hosting. You'll gain advanced skills in data integration, security, and analysis to create efficient and secure mapping systems. What this Book will help me do Learn to install and configure GeoServer for secure and scalable enterprise use. Optimize data handling for complex datasets, including vectors and rasters. Enhance GeoServer's security with corporate integration and secure connections. Gain expertise in styling and deploying production-ready maps. Monitor and optimize GeoServer's performance for large-scale operations. Author(s) None Henderson is a seasoned GIS specialist with years of experience in geospatial systems and geospatial data hosting solutions. Known for their practical insights and clear explanations, Henderson brings practical expertise to every chapter. They aim to provide readers with actionable, real-world solutions to hosting and managing geospatial data effectively. Who is it for? This book is ideal for GIS professionals, system administrators, and developers managing enterprise-scale geospatial data. Whether you're new to GeoServer or aiming to enhance an existing deployment, you'll find tailored guidance for your needs. Readers should have basic GIS knowledge but need not have previous GeoServer experience. This book targets those looking to optimize geospatial servers for enterprise environments.

The Big Data-Driven Business

Get the expert perspective and practical advice on big data The Big Data-Driven Business: How to Use Big Data to Win Customers, Beat Competitors, and Boost Profits makes the case that big data is for real, and more than just big hype. The book uses real-life examples—from Nate Silver to Copernicus, and Apple to Blackberry—to demonstrate how the winners of the future will use big data to seek the truth. Written by a marketing journalist and the CEO of a multi-million-dollar B2B marketing platform that reaches more than 90% of the U.S. business population, this book is a comprehensive and accessible guide on how to win customers, beat competitors, and boost the bottom line with big data. The marketplace has entered an era where the customer holds all the cards. With unprecedented choice in both the consumer world and the B2B world, it's imperative that businesses gain a greater understanding of their customers and prospects. Big data is the key to this insight, because it provides a comprehensive view of a company's customers—who they are, and who they may be tomorrow. The Big Data-Driven Business is a complete guide to the future of business as seen through the lens of big data, with expert advice on real-world applications. Learn what big data is, and how it will transform the enterprise Explore why major corporations are betting their companies on marketing technology Read case studies of big data winners and losers Discover how to change privacy and security, and remodel marketing Better information allows for better decisions, better targeting, and better reach. Big data has become an indispensable tool for the most effective marketers in the business, and it's becoming less of a competitive advantage and more like an industry standard. Remaining relevant as the marketplace evolves requires a full understanding and application of big data, and The Big Data-Driven Business provides the practical guidance businesses need.