talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

IBM Software for SAP Solutions

SAP is a market leader in enterprise business application software. SAP solutions provide a rich set of composable application modules, and configurable functional capabilities that are expected from a comprehensive enterprise business application software suite. In most cases, companies that adopt SAP software remain heterogeneous enterprises running both SAP and non-SAP systems to support their business processes. Regardless of the specific scenario, in heterogeneous enterprises most SAP implementations must be integrated with a variety of non-SAP enterprise systems: Portals Messaging infrastructure Business process management (BPM) tools Enterprise Content Management (ECM) methods and tools Business analytics (BA) and business intelligence (BI) technologies Security Systems of record Systems of engagement When SAP software is used in a large, heterogeneous enterprise environment, SAP clients face the dilemma of selecting the correct set of tools and platforms to implement SAP functionality, and to integrate the SAP solutions with non-SAP systems. This IBM® Redbooks® publication explains the value of integrating IBM software with SAP solutions. It describes how to enhance and extend pre-built capabilities in SAP software with best-in-class IBM enterprise software, enabling clients to maximize return on investment (ROI) in their SAP investment and achieve a balanced enterprise architecture approach. This book describes IBM Reference Architecture for SAP, a prescriptive blueprint for using IBM software in SAP solutions. The reference architecture is focused on defining the use of IBM software with SAP, and is not intended to address the internal aspects of SAP components. The chapters of this book provide a specific reference architecture for many of the architectural domains that are each important for a large enterprise to establish common strategy, efficiency, and balance. The majority of the most important architectural domain topics, such as integration, process optimization, master data management, mobile access, Enterprise Content Management, business intelligence, DevOps, security, systems monitoring, and so on, are covered in the book. However, there are several other architectural domains which are not included in the book. This is not to imply that these other architectural domains are not important or are less important, or that IBM does not offer a solution to address them. It is only reflective of time constraints, available resources, and the complexity of assembling a book on an extremely broad topic. Although more content could have been added, the authors feel confident that the scope of architectural material that has been included should provide organizations with a fantastic head start in defining their own enterprise reference architecture for many of the important architectural domains, and it is hoped that this book provides great value to those reading it. This IBM Redbooks publication is targeted to the following audiences: Client decision makers and solution architects leading enterprise transformation projects and wanting to gain further insight so that they can benefit from the integration of IBM software in large-scale SAP projects. IT architects and consultants integrating IBM technology with SAP solutions.

Oracle Database 12c PL/SQL Advanced Programming Techniques

Take Your PL/SQL Programming Skills to the Next Level Build robust database-centric PL/SQL applications quickly and effectively. Oracle Database 12c PL/SQL Advanced Programming Techniques shows you how to write and deploy Java libraries inside Oracle Database 12c, use the utl_file and DBMS_SCHEDULER packages, and create external tables and external procedures. Application security, performance tuning, and Oracle Database In-Memory are also covered in this Oracle Press guide. Configure, deploy, and troubleshoot Java libraries for Oracle object types Use the utl_file package to manage unstructured and structured data Develop and deploy Java I/O libraries and wrap them with PL/SQL Create and use external tables Implement high-speed data transfer Harden database systems and develop secure applications Manage complex schedules and jobs with the DBMS_SCHEDULER package Optimize PL/SQL for use in performance tuning Create and deploy external procedures Implement the Oracle Database In-Memory column store feature

IBM XIV Storage System Architecture and Implementation

This IBM® Redbooks® publication describes the concepts, architecture, and implementation of the IBM XIV® Storage System. The XIV Storage System is a scalable enterprise storage system that is based on a grid array of hardware components. It can attach to both Fibre Channel Protocol (FCP) and IP network Small Computer System Interface (iSCSI) capable hosts. This system is a good fit for clients who want to be able to grow capacity without managing multiple tiers of storage. The XIV Storage System is suited for mixed or random access workloads, including online transaction processing, video streamings, images, email, and emerging workload areas, such as Web 2.0 and cloud storage. The focus of this edition is on the XIV Gen3 running Version 11.5 of the XIV system software, which brings enhanced value for the XIV Storage System in cloud environments. It offers multitenancy support, VMware vCloud Suite integration, more discrete performance classes, and RESTful API enhancements that expand cloud automation integration. Version 11.5 introduces support for three-site mirroring to provide high availability and disaster recovery. It also enables capacity planning through the Hyper-Scale Manager, mobile push notifications for real-time alerts, and enhanced security. In the first few chapters of this book, we describe many of the unique and powerful concepts that form the basis of the XIV Storage System logical and physical architecture. We explain how the system eliminates direct dependencies between the hardware elements and the software that governs the system. In subsequent chapters, we explain the planning and preparation tasks that are required to deploy the system in your environment by using the intuitive yet powerful XIV Storage Manager GUI or the XIV command-line interface. We also describe the performance characteristics of the XIV Storage System and present options for alerting and monitoring, including enhanced secure remote support. This book is for IT professionals who want an understanding of the XIV Storage System. It is also for readers who need detailed advice on how to configure and use the system.

Building Real-time Mobile Solutions with MQTT and IBM MessageSight

Message Queuing Telemetry Transport (MQTT) is a messaging protocol designed for the Internet of Things (IoT). It is lightweight enough to be supported by the smallest devices, yet robust enough to ensure that important messages get to their destinations every time. With MQTT devices, such as energy meters, cars, trains, mobile phones and tablets, and personal health care devices, devices can communicate with each other and with other systems or applications. IBM® MessageSight is a messaging appliance designed to handle the scale and security of a robust IoT solution. MessageSight allows you to easily secure connections, configure policies for messaging, and scale to up to a million concurrently connected devices. This IBM Redbooks® publication introduces MQTT and MessageSight through a simple key fob remote MQTT application. It then dives into the architecture and development of a robust, cross-platform Ride Share and Taxi solution (PickMeUp) with real-time voice, GPS location sharing, and chat among a variety of mobile platforms. The publication also includes an addendum describing use cases in a variety of other domains, with sample messaging topology and suggestions for design.

10 Don'ts on Your Digital Devices: The Non-Techies Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Donts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps. Its a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Donts cant do much for the lazy and the greedy, but they can save the unwary and the ignorant a world of trouble. 10 Donts employs personal anecdotes and major news stories to illustrate what canand all too often doeshappen when users are careless with their devices and data. Each chapter describes a common type of blunder (one of the 10 Donts), reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Dont. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Donts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy, so that you dont get phished, give up your password, get lost in the cloud, look for a free lunch, do secure things from insecure places, let the snoops in, be careless when going mobile, use dinosaurs, or forget the physicalin short, so that you dont trust anyone overanything. Non-techie readers are not unsophisticated readers. They spend much of their waking lives on their devices and are bombarded with and alarmed by news stories of unimaginably huge data breaches, unimaginably sophisticated "advanced persistent threat" activities by criminal organizations and hostile nation-states, and unimaginably intrusive clandestine mass electronic surveillance and data mining sweeps by corporations, data brokers, and the various intelligence and law enforcement arms of our own governments. The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops.

Key Management Deployment Guide: Using the IBM Enterprise Key Management Foundation

In an increasingly interconnected world, data breaches grab headlines. The security of sensitive information is vital, and new requirements and regulatory bodies such as the Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and Sarbanes-Oxley (SOX) create challenges for enterprises that use encryption to protect their information. As encryption becomes more widely adopted, organizations also must contend with an ever-growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of the encrypted information. Centralized management of keys and certificates is necessary to perform the complex tasks that are related to key and certificate generation, renewal, and backup and recovery. The IBM® Enterprise Key Management Foundation (EKMF) is a flexible and highly secure key management system for the enterprise. It provides centralized key management on IBM zEnterprise® and distributed platforms for streamlined, efficient, and secure key and certificate management operations. This IBM Redbooks® publication introduces key concepts around a centralized key management infrastructure and depicts the proper planning, implementation, and management of such a system using the IBM Enterprise Key Management Foundation solution.

IBM MQ V8 Features and Enhancements

The power of IBM® MQ is its flexibility combined with reliability, scalability, and security. This flexibility provides a large number of design and implementation choices. Making informed decisions from this range of choices can simplify the development of applications and the administration of an MQ messaging infrastructure. Applications that access such an infrastructure can be developed using a wide range of programming paradigms and languages. These applications can run within a substantial array of software and hardware environments. Customers can use IBM MQ to integrate and extend the capabilities of existing and varied infrastructures in the information technology (IT) system of a business. IBM MQ V8.0 was released in June 2014. Before that release, the product name was IBM WebSphere® MQ. This IBM Redbooks® publication covers the core enhancements made in IBM MQ V8 and the concepts that must be understood. A broad understanding of the product features is key to making informed design and implementation choices for both the infrastructure and the applications that access it. Details of new areas of function for IBM MQ are introduced throughout this book, such as the changes to security, publish/subscribe clusters, and IBM System z exploitation. This book is for individuals and organizations who make informed decisions about design and applications before implementing an IBM MQ infrastructure or begin development of an IBM MQ application.

Creating Universes with SAP BusinessObjects

Dive into the world of SAP BusinessObjects Universe creation with this comprehensive guide. This book explains how to leverage the SAP Information Design Tool to design and maintain Universes effectively. Whether you're a beginner starting out or an experienced developer transitioning to new tools, you'll find practical insights and guided tutorials to enhance your abilities. What this Book will help me do Understand the fundamental concepts of SAP BusinessObjects Universes and how they facilitate Business Intelligence. Gain expertise in using the SAP Information Design Tool effectively for creating and managing Universes. Learn to build a solid and scalable Data Foundation layer tailored to your organization's needs. Explore methods to ensure the security of Universes using the Security Profile Editor. Master the skills to test, troubleshoot, and refine Universes for reliable reporting outcomes. Author(s) Taha Mahmoud is an experienced SAP consultant specializing in Business Intelligence. With a strong background in SAP BusinessObjects solutions, Taha brings years of hands-on expertise to teaching and technical writing. He focuses on creating precise and practical content to empower readers to solve real-world challenges. Who is it for? This book is tailored for SAP BusinessObjects Universe developers of all skill levels. Beginners will gain structured guidance on how to start and advance in Universe design. Experienced developers will find great value in mapping their knowledge to the newer tools and techniques. If you are responsible for business reporting or strive to optimize your organization's BI infrastructure, this resource is ideal for you.

Mastering MariaDB

In 'Mastering MariaDB', you'll explore advanced techniques for managing, optimizing, and maintaining your MariaDB database servers. This book teaches you how to analyze query performance, implement best practices for security, and ensure data durability and availability through robust configurations and procedures. What this Book will help me do Learn to analyze query performance to optimize database efficiency. Gain expertise in implementing secure and organized role-based access controls. Achieve effective database backups with reliable recovery strategies. Set up replication environments to enable high availability of data. Explore clustering and sharding techniques for powerful scalability solutions. Author(s) None Razzoli is an experienced database administrator and author, specializing in MariaDB and other open-source database solutions. With an extensive career in database optimization and troubleshooting, None has helped businesses achieve greater performance and reliability with their systems. As a writer, they focus on clear, precise instruction and practical, real-world applications of database technology. Who is it for? This book is ideal for database administrators and system engineers who are already familiar with the basics of MariaDB and want to elevate their expertise. Intermediate MariaDB users looking to optimize their systems, ensure data security, and set up advanced configurations will find this book immensely helpful. It's written for professionals who actively manage database systems and require advanced knowledge to improve performance and reliability. If you're seeking deeper insights into MariaDB's features and scalability techniques, this book is for you.

Professional Microsoft SQL Server 2014 Administration

Learn to take advantage of the opportunities offered by SQL Server 2014 Microsoft's SQL Server 2014 update means big changes for database administrators, and you need to get up to speed quickly because your methods, workflow, and favorite techniques will be different from here on out. The update's enhanced support of large-scale enterprise databases and significant price advantage mean that SQL Server 2014 will become even more widely adopted across the industry. The update includes new backup and recovery tools, new AlwaysOn features, and enhanced cloud capabilities. In-memory OLTP, Buffer Pool Extensions for SSDs, and a new Cardinality Estimator can improve functionality and smooth out the workflow, but only if you understand their full capabilities. Professional Microsoft SQL Server 2014 is your comprehensive guide to working with the new environment. Authors Adam Jorgensen, Bradley Ball, Ross LoForte, Steven Wort, and Brian Knight are the dream team of the SQL Server community, and they put their expertise to work guiding you through the changes. Improve oversight with better management and monitoring Protect your work with enhanced security features Upgrade performance tuning, scaling, replication, and clustering Learn new options for backup and recovery Professional Microsoft SQL Server 2014 includes a companion website with sample code and efficient automation utilities, plus a host of tips, tricks, and workarounds that will make your job as a DBA or database architect much easier. Stop getting frustrated with administrative issues and start taking control. Professional Microsoft SQL Server 2014 is your roadmap to mastering the update and creating solutions that work.

ABCs of IBM z/OS System Programming Volume 1

The ABCs of IBM® z/OS® System Programming is a 13-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. Whether you want to become more familiar with z/OS in your current environment, or you are evaluating platforms to consolidate your online business applications, the ABCs collection will serve as a powerful technical tool. Volume 1 provides an updated understanding of the software and IBM zSeries architecture, and explains how it is used together with the z/OS operating system. This includes the main components of z/OS needed to customize and install the z/OS operating system. This edition has been significantly updated and revised. The other volumes contain the following content: Volume 2: z/OS implementation and daily maintenance, defining subsystems, IBM Job Entry Subsystem 2 (JES2) and JES3, link pack area (LPA), LNKLST, authorized libraries, System Modification Program/Extended (SMP/E), IBM Language Environment® Volume 3: Introduction to Data Facility Storage Management Subsystem (DFSMS), data set basics, storage management hardware and software, catalogs, and DFSMS Transactional Virtual Storage Access Method (VSAM), or DFSMStvs Volume 4: z/OS Communications Server, Transmission Control Protocol/Internet Protocol (TCP/IP), and IBM Virtual Telecommunications Access Method (IBM VTAM®) Volume 5: Base and IBM Parallel Sysplex®, z/OS System Logger, Resource Recovery Services (RRS), Global Resource Serialization (GRS), z/OS system operations, z/OS Automatic Restart Manager (ARM), IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) Volume 6: Introduction to security, IBM Resource Access Control Facility (IBM RACF®), Digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM eServer™ z990 integrated cryptography, zSeries firewall technologies, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, zSeries processor design, zSeries connectivity, LPAR concepts, HCD, and IBM DS8000® Volume 11: Capacity planning, IBM Performance Management, z/OS Workload Manager (WLM), IBM Resource Management Facility (IBM RMF™), and IBM System Management Facility (SMF) Volume 12: WLM Volume 13: JES2 and JES3 System Display and Search Facility (SDSF)

ABCs of IBM z/OS System Programming Volume 6

The ABCs of IBM® z/OS® System Programming is an 11-volume collection that provides an introduction to the z/OS operating system and the hardware architecture. Whether you are a beginner or an experienced system programmer, the ABCs collection provides the information that you need to start your research into z/OS and related subjects. If you want to become more familiar with z/OS in your current environment or if you are evaluating platforms to consolidate your e-business applications, the ABCs collection can serve as a powerful technical tool. Following are the contents of the volumes: Volume 1: Introduction to z/OS and storage concepts, TSO/E, ISPF, JCL, SDSF, and z/OS delivery and installation Volume 2: z/OS implementation and daily maintenance, defining subsystems, JES2 and JES3, LPA, LNKLST, authorized libraries, IBM Language Environment®, and SMP/E Volume 3: Introduction to DFSMS, data set basics, storage management hardware and software, VSAM, System-managed storage, catalogs, and DFSMStvs Volume 4: Communication Server, TCP/IP, and IBM VTAM® Volume 5: Base and IBM Parallel Sysplex®, System Logger, Resource Recovery Services (RRS), global resource serialization (GRS), z/OS system operations, automatic restart management (ARM), and IBM Geographically Dispersed Parallel Sysplex™ (IBM GDPS®) Volume 6: Introduction to security, IBM RACF®, digital certificates and public key infrastructure (PKI), Kerberos, cryptography and IBM z9® integrated cryptography, Lightweight Directory Access Protocol (LDAP), and Enterprise Identity Mapping (EIM) Volume 7: Printing in a z/OS environment, Infoprint Server, and Infoprint Central Volume 8: An introduction to z/OS problem diagnosis Volume 9: z/OS UNIX System Services Volume 10: Introduction to IBM z/Architecture®, IBM System z® processor design, System z connectivity, logical partition (LPAR) concepts, hardware configuration definition (HCD), and Hardware Management Console (HMC) Volume 11: Capacity planning, performance management, Workload Manager (WLM), IBM Resource Measurement Facility™ (RMF™), and System Management Facilities (SMF)

MySQL Cookbook, 3rd Edition

MySQLâ??s popularity has brought a flood of questions about how to solve specific problems, and thatâ??s where this cookbook is essential. When you need quick solutions or techniques, this handy resource provides scores of short, focused pieces of code, hundreds of worked-out examples, and clear, concise explanations for programmers who donâ??t have the time (or expertise) to solve MySQL problems from scratch. Ideal for beginners and professional database and web developers, this updated third edition covers powerful features in MySQL 5.6 (and some in 5.7). The book focuses on programming APIs in Python, PHP, Java, Perl, and Ruby. With more than 200+ recipes, youâ??ll learn how to: Use the mysql client and write MySQL-based programs Create, populate, and select data from tables Store, retrieve, and manipulate strings Work with dates and times Sort query results and generate summaries Use stored routines, triggers, and scheduled events Import, export, validate, and reformat data Perform transactions and work with statistics Process web input, and generate web content from query results Use MySQL-based web session management Provide security and server administration

The Complete Guide to CICS Transaction Gateway Volume 1 Configuration and Administration

In this IBM® Redbooks® publication, you will gain an appreciation of the IBM CICS® Transaction Gateway (CICS TG) product suite, based on key criteria, such as capabilities, scalability, platform, CICS server support, application language support, and licensing model. Matching the requirements to available infrastructure and hardware choices requires an appreciation of the choices available. In this book, you will gain an understanding of those choices, and will be capable of choosing the appropriate CICS connection protocol, APIs for the applications, and security options. You will understand the services available to the application developer when using a chosen protocol. You will then learn about how to implement CICS TG solutions, taking advantage of the latest capabilities, such as IPIC connectivity, high availability, and Dynamic Server Selection. Specific scenarios illustrate the usage of CICS TG for IBM z/OS®, and CICS TG for Multiplatforms, with CICS Transaction Server for z/OS and IBM WebSphere® Application Server, including connections in CICS, configuring simple end-to-end connectivity (all platforms) with verification for remote and local mode applications, and adding security, XA support, and high availability.

Big Data Analytics Strategies for the Smart Grid

By implementing a comprehensive data analytics program, utility companies can meet the continually evolving challenges of modern grids that are operationally efficient, while reconciling the demands of greenhouse gas legislation and establishing a meaningful return on investment from smart grid deployments. Readable and accessible, Big Data Analytics Strategies for the Smart Grid addresses the needs of applying big data technologies and approaches, including Big Data cybersecurity, to the critical infrastructure that makes up the electrical utility grid. It supplies industry stakeholders with an in-depth understanding of the engineering, business, and customer domains within the power delivery market. The book explores the unique needs of electrical utility grids, including operational technology, IT, storage, processing, and how to transform grid assets for the benefit of both the utility business and energy consumers. It not only provides specific examples that illustrate how analytics work and how they are best applied, but also describes how to avoid potential problems and pitfalls. Discussing security and data privacy, it explores the role of the utility in protecting their customers’ right to privacy while still engaging in forward-looking business practices. The book includes discussions of: SAS for asset management tools The AutoGrid approach to commercial analytics Space-Time Insight’s work at the California ISO (CAISO) This book is an ideal resource for mid- to upper-level utility executives who need to understand the business value of smart grid data analytics. It explains critical concepts in a manner that will better position executives to make the right decisions about building their analytics programs. At the same time, the book provides sufficient technical depth that it is useful for data analytics professionals who need to better understand the nuances of the engineering and business challenges unique to the utilities industry.

Cloudera Administration Handbook

Discover how to effectively administer large Apache Hadoop clusters with the Cloudera Administration Handbook. This guide offers step-by-step instructions and practical examples, enabling you to confidently set up and manage Hadoop environments using Cloudera Manager and CDH5 tools. Through this book, administrators or aspiring experts can unlock the power of distributed computing and streamline cluster operations. What this Book will help me do Gain in-depth understanding of Apache Hadoop architecture and its operational framework. Master the setup, configuration, and management of Hadoop clusters using Cloudera tools. Implement robust security measures in your cluster including Kerberos authentication. Optimize for reliability with advanced HDFS features like High Availability and Federation. Streamline cluster management and address troubleshooting effectively using best practices. Author(s) None Menon is an experienced technologist specializing in distributed computing and data infrastructure. With a strong background in big data platforms and certifications in Hadoop administration, None has helped enterprises optimize their cluster deployments. Their instructional approach combines clarity, practical insights, and a hands-on focus. Who is it for? This book is ideal for systems administrators, data engineers, and IT professionals keen on mastering Hadoop environments. It serves both beginners getting started with cluster setup and seasoned administrators seeking advanced configurations. If you're aiming to efficiently manage Hadoop clusters using Cloudera solutions, this guide provides the knowledge and tools you need.

Microsoft® Azure™ SQL Database Step by Step

Your hands-on guide to Azure SQL Database fundamentals Expand your expertise—and teach yourself the fundamentals of Microsoft Azure SQL Database. If you have previous programming experience but are new to Azure, this tutorial delivers the step-by-step guidance and coding exercises you need to master core topics and techniques. Discover how to: Perform Azure setup and configuration Explore design and security considerations Use programming and reporting services Migrate data Backup and sync data Work with scalability and high performance Understand the differences between SQL Server and Microsoft Azure SQL Database

Large Scale and Big Data

Large Scale and Big Data: Processing and Management provides readers with a central source of reference on the data management techniques currently available for large-scale data processing. Presenting chapters written by leading researchers, academics, and practitioners, it addresses the fundamental challenges associated with Big Data processing tools and techniques across a range of computing environments. The book begins by discussing the basic concepts and tools of large-scale Big Data processing and cloud computing. It also provides an overview of different programming models and cloud-based deployment models. The book’s second section examines the usage of advanced Big Data processing techniques in different domains, including semantic web, graph processing, and stream processing. The third section discusses advanced topics of Big Data processing such as consistency management, privacy, and security. Supplying a comprehensive summary from both the research and applied perspectives, the book covers recent research discoveries and applications, making it an ideal reference for a wide range of audiences, including researchers and academics working on databases, data mining, and web scale data processing. After reading this book, you will gain a fundamental understanding of how to use Big Data-processing tools and techniques effectively across application domains. Coverage includes cloud data management architectures, big data analytics visualization, data management, analytics for vast amounts of unstructured data, clustering, classification, link analysis of big data, scalable data mining, and machine learning techniques.

Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of fines and damage to their reputations. Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records outlines the new regulatory regime, and it also provides IT professionals with the processes and protocols, standards, and governance tools they need to maintain a secure and legal environment for data and records. It’s a concrete resource that will help you understand the issues affecting the law and regulatory compliance, privacy, and security in the enterprise. As healthcare IT security expert Bernard Peter Robichau II shows, the success of a privacy and security initiative lies not just in proper planning but also in identifying who will own the implementation and maintain technologies and processes. From executive sponsors to system analysts and administrators, a properly designed security program requires that that the right people are assigned to the right tasks and have the tools they need. Robichau explains how to design and implement that program with an eye toward long-term success. Putting processes and systems in place is, of course, only the start. Robichau also shows how to manage your security program and maintain operational support including ongoing maintenance and policy updates. (Because regulations never sleep!) This book will help you devise solutions that include: Identity and access management systems Proper application design Physical and environmental safeguards Systemwide and client-based security configurations Safeguards for patient data Training and auditing procedures Governance and policy administration Healthcare Information Privacy and Security is the definitive guide to help you through the process of maintaining privacy and security in the healthcare industry. It will help you keep health information safe, and it will help keep your organization—whether local clinic or major hospital system—on the right side of the law.

OCP Upgrade to Oracle Database 12c Exam Guide (Exam 1Z0-060), 2nd Edition

A Fully Integrated Study System for OCP Exam 1Z0-060 Prepare for the Oracle Certified Professional Upgrade to Oracle Database 12 c exam with this exclusive Oracle Press guide. Each chapter features step-by-step examples, a certification summary, a two-minute drill, and a self-test to reinforce the topics presented. This authoritative resource helps you pass the exam and also serves as an essential, on-the-job reference. Get complete coverage of the new features of Oracle Database 12 c, including: Oracle Enterprise Manager Database Express and additional tools for database monitoring Multitenant container databases and pluggable databases Auditing, administrative privileges, data redaction, and other Oracle security features Adaptive execution plans, adaptive statistics, and automatic SQL plan management Oracle Recovery Manager backup and recovery improvements Oracle Database Resource Manager and other performance enhancements Oracle Data Pump, SQL*Loader, external tables, and online operations enhancements Improvements to information lifecycle management and storage, including automatic data optimization, in-database archiving, and temporal validity Electronic content includes: 170 practice exam questions with detailed answer explanations