talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

IBM PowerVM Best Practices

This IBM® Redbooks® publication provides best practices for planning, installing, maintaining, and monitoring the IBM PowerVM® Enterprise Edition virtualization features on IBM POWER7® processor technology-based servers. PowerVM is a combination of hardware, PowerVM Hypervisor, and software, which includes other virtualization features, such as the Virtual I/O Server. This publication is intended for experienced IT specialists and IT architects who want to learn about PowerVM best practices, and focuses on the following topics: Planning and general best practices Installation, migration, and configuration Administration and maintenance Storage and networking Performance monitoring Security PowerVM advanced features

Oracle Business Intelligence 11g Developers Guide

Master Oracle Business Intelligence 11 g Reports and Dashboards Deliver meaningful business information to users anytime, anywhere, on any device, using Oracle Business Intelligence 11g. Written by Oracle ACE Director Mark Rittman, Oracle Business Intelligence 11g Developers Guide fully covers the latest BI report design and distribution techniques. Find out how to execute effective queries, build accurate models, use scorecards and KPIs, create dynamic reports, set up dashboards, and publish to smartphones and wireless devices. This Oracle Press guide contains comprehensive details on Oracle Exalytics In-Memory Machine, the best-in-class, preintegrated BI platform. Install or upgrade to Oracle Business Intelligence 11g Develop and manage custom Oracle Business Intelligence repositories Access relational, file, and multidimensional data sources Design print-quality reports with Oracle Business Intelligence Publisher Create web-enabled analyses, dashboards, and visualizations Integrate with other applications using Oracle Business Intelligence 11g Action Framework Employ authentication, authorization, and row-level security Configure and deploy Oracle Exalytics In-Memory Machine

IBM Business Process Manager Security: Concepts and Guidance

This IBM® Redbooks® publication provides information about security concerning an organization’s business process management (BPM) program, about common security holes that often occur in this field, and describes techniques for rectifying these holes. This book documents preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured BPM installation. Many of the practices described in this book apply equally to generic Java Platform and Enterprise Edition (J2EE) applications, as well as to BPM. However, it focuses on aspects that typically do not receive adequate consideration in actual practice. Also, it addresses equally the BPM Standard and BPM Advanced Editions, although there are topics inherent in BPM Advanced that we considered to be out of scope for this book. This book is not meant as a technical deep-dive into any one topic, technology, or philosophy. IBM offers a variety of training and consulting services that can help you to understand and evaluate the implications of this book’s topic in your own organization.

Microsoft® SQL Server 2012 Management and Administration, Second Edition

If you need to deploy, manage, or secure Microsoft SQL Server 2012, this is the complete, fast-paced, task-based reference you’ve been searching for. Authored by a worldclass expert on running SQL Server in the enterprise, this book goes far beyond the basics, taking on the complex tasks that DBAs need to make the most of Microsoft’s first cloud-enabled database platform. Designed for maximum practical usability, it’s packed with expert tips and up-to-date real-world configuration guidance you simply won’t find anywhere else. As someone who helped influence the design of SQL Server 2012 and drawing on many months of beta testing, Ross Mistry provides immediately usable solutions for installation and upgrades, management and monitoring, performance and availability, security, consolidation, virtualization, troubleshooting, and more. Mistry identifies new features and corresponding best practices in every chapter, helping you take full advantage of new SQL Server innovations ranging from private cloud support to AlwaysOn Availability Groups. Understand how to: Efficiently install or upgrade the SQL Server 2012 database engine Administer and configure database engine settings, storage, I/O, and partitioning Transfer data on-premise or to the cloud Manage and optimize indexes Learn how to consolidate, virtualize and optimize SQL Server for Private Clouds Harden and audit SQL Server 2012 environments Administer security and authorization, including new Contained Databases Encrypt data and communications Design and deploy new AlwaysOn high-availability and disaster recovery features Implement maintenance best practices, including Policy-Based Management

Microsoft® SQL Server® 2012 Integration Services

Build and manage data integration solutions with expert guidance from the Microsoft SQL Server Integration Services (SSIS) team. See best practices in action and dive deep into the SSIS engine, SSISDB catalog, and security features. Using the developer enhancements in SQL Server 2012 and the flexible SSIS toolset, you’ll handle complex data integration scenarios more efficiently—and acquire the skills you need to build comprehensive solutions. Discover how to: Use SSIS to extract, transform, and load data from multiple data sources Apply best practices to optimize package and project configuration and deployment Manage security settings in the SSISDB catalog and control package access Work with SSIS data quality features to profile, cleanse, and increase reliability Monitor, troubleshoot, and tune SSIS solutions with advanced features such as detailed views and data taps Load data incrementally to capture an easily consumable stream of insert, update, and delete activity

Unleashing DB2 10 for Linux, UNIX, and Windows

This IBM® Redbooks® publication provides a broad understanding of the key features in IBM DB2® 10 and how to use these features to get more value from business applications. It includes information about the following features: Time Travel Query, which you use to store and retrieve time-based data by using capability built into DB2 10, without needing to build your own solution Adaptive compression, an enhanced compression technology that adapts to changing data patterns, yielding extremely high compression ratios Multi-temperature storage, which you may use to optimize storage costs by identifying and managing data based on its “temperature” or access requirements Row and column access control, which offers security access enforcement on your data, at the row or column level, or both Availability enhancements, which provide different DB2 availability features for different enterprise needs; high availability disaster recovery (HADR) multiple-standby databases provide availability and data recovery in one technology, and the IBM DB2 pureScale® Feature provides continuous availability and scalability that is transparent to applications Oracle compatibility, which allows many applications written for Oracle to run on DB2, virtually unchanged Ingest utility, a feature-rich data movement utility that allows queries to run concurrently with minimal impact on data availability

Endpoint Security and Compliance Management Design Guide Using IBM Tivoli Endpoint Manager

Organizations today are more widely distributed than ever before, which can make systems management tasks, such as distributing software, patches, and security policies, extremely challenging. The IBM® Tivoli® Endpoint Manager platform is architected for today's highly diverse, distributed, and complex IT environments. It provides real-time visibility and control through a single infrastructure, single agent, and single console for systems lifecycle management, endpoint protection, and security configuration and vulnerability management. This platform enables organizations to securely manage their global IT infrastructures faster and more accurately, resulting in improved governance, control, visibility, and business agility. Plus, it gives organizations the ability to handle tomorrow's unforeseen challenges. In this IBM Redbooks® publication, we provide IT security professionals with a better understanding around the challenging topic of endpoint management in the IT security domain. We focus on IBM Tivoli Endpoint Manager for Security and Compliance and describe the product architecture and provide a hands-on design guide for deploying the solution. This book is a valuable resource for security professionals and architects who want to understand and implement a centralized endpoint management infrastructure and endpoint protection to better handle security and compliance challenges.

SAP BusinessObjects BI 4.0 The Complete Reference 3/E

The definitive reference for building actionable business intelligence—completely revised for SAP BusinessObjects BI 4.0. Unleash the full potential of business intelligence with fact-based decisions, aligned to business goals, using reports and dashboards that lead from insight to action. SAP BusinessObjects BI 4.0: The Complete Reference offers completely updated coverage of the latest BI platform. Find out how to work with the new Information Design Tool to create universes that access multiple data sources and SAP BW. See how to translate complex business questions into highly efficient Web Intelligence queries and publish your results to the BI Launchpad. Learn how to create dashboards from data sourced through a universe or spreadsheet. The most important concepts for universe designers, report and dashboard authors, and business analysts are fully explained and illustrated by screenshots, diagrams, and step-by-step instructions. Establish and evolve BI goals Maximize your BI investments by offering the right module to the right user Create robust universes with the Information Design Tool, leveraging multiple data sources, derived tables, aggregate awareness, and parameters Develop a security plan that is scalable and flexible Design Web Intelligence reports from basic to advanced Create sophisticated calculations and advanced formatting to highlight critical business trends Build powerful dashboards to embed in PowerPoint or the BI Launchpad Use Explorer to visually navigate large data sets and uncover patterns

Securing SQL Server, 2nd Edition

SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book written by Denny Cherry, a Microsoft SQL MVP and one of the biggest names in SQL server today, readers learn how to properly secure a SQL server database from internal and external threats using best practices as well as specific tricks the authors employ in their roles as database administrators for some of the largest SQL server deployments in the world. "Denny Cherry is what would happen if Bill Gates and AC/DC got together to create a sibling. He's a bare-knuckles, no holds-barred technologist, and you can bet that if he tells you that something does or doesn't work, he's speaking from experience. Active in the community, his passion is sharing. You'll enjoy this book."--Buck Woody, Senior Technology Specialist, Microsoft Presents hands-on techniques for protecting your SQL Server database from intrusion and attack Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali) Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs

Microsoft® SQL Server® 2012 Analysis Services: The BISM Tabular Model

Build agile and responsive Business Intelligence solutions Analyze tabular data using the BI Semantic Model (BISM) in Microsoft SQL Server 2012 Analysis Services—and discover a simpler method for creating corporate-level BI solutions. Led by three BI experts, you’ll learn how to build, deploy, and query a BISM tabular model with step-by-step guides, examples, and best practices. This hands-on book shows you how the tabular model’s in-memory database enables you to perform rapid analytics—whether you’re a professional BI developer new to Analysis Services or familiar with its multidimensional model. Discover how to: Determine when a tabular or multidimensional model is right for your project Build a tabular model using SQL Server Data Tools in Microsoft Visual Studio 2010 Integrate data from multiple sources into a single, coherent view of company information Use the Data Analysis eXpressions (DAX) language to create calculated columns, measures, and queries Choose a data modeling technique that meets your organization’s performance and usability requirements Optimize your data model for better performance with xVelocity storage engine Manage complex data relationships, such as multicolumn, banding, and many-to-many Implement security by establishing administrative and data user roles

Training Kit Exam 70-462: Administering Microsoft® SQL Sever® 2012 Databases

EXAM PREP GUIDE Ace your preparation for the skills measured by Exam 70-462—and on the job—with this official Microsoft study guide. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply what you’ve learned through real-world case scenarios and practice exercises. Maximize your performance on the exam by mastering the skills and experience measured by these objectives: Install and configure SQL Server Maintain instances and databases Optimize and troubleshoot SQL Server Manage data Implement security Implement high availability PRACTICE TESTS A Note Regarding Practice Tests Assess your skills with practice tests. You can work through hundreds of questions using multiple testing modes to meet your specific learning needs. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.

Building an Ensemble Using IBM zEnterprise Unified Resource Manager

For the first time it is possible to deploy an integrated hardware platform that brings mainframe and distributed technologies together: a system that can start to replace individual islands of computing and that can work to reduce complexity, improve security, and bring applications closer to the data that they need.

FileMaker® 12 In Depth

FileMaker® 12 In Depth Do more in less time! FileMaker 12 In Depth is the most comprehensive, coherent, and practical guide to creating professional-quality solutions with the newest versions of FileMaker! Drawing on his unsurpassed real-world experience as a FileMaker user, consultant, and developer, Jesse Feiler helps you gain practical mastery of today’s newest, most advanced FileMaker tools and features. • Use themes to build solutions for FileMaker Pro on Windows and OS X, FileMaker Go on iOS, and Instant Web Publishing • Get the most out of new container field technology • Quickly become a FileMaker 12 power user • Make the most of FileMaker fields, tables, layouts, and parts • Iteratively design reliable, high-performance FileMaker relational databases • Work with relationships, including self-joins and cross-product relationships • Write calculation formulas and use functions • Use event-driven scripts to make databases more interactive • Build clear and usable reports, publish them, and incorporate them into workflows • Secure applications with user accounts, privileges, file-level access, network security, and authentication • Use FileMaker’s Web Viewer to access live web-based data • Convert systems from older versions of FileMaker, and troubleshoot successfully • Share, exchange, export, and publish data via SQL and XML • Instantly publish databases on the web, and use advanced Custom Web Publishing techniques • Trigger automated behaviors whenever specific events occur • Extend FileMaker’s functionality with plug-ins • Set up, configure, tune, and secure FileMaker Server All In Depth books offer • Comprehensive coverage with detailed solutions • Troubleshooting help for tough problems you can’t fix on your own • Outstanding authors recognized worldwide for their expertise and teaching style Learning, reference, problem-solving... the only FileMaker 12 book you need!

Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments, Second Edition

The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computing Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components Explores Business Continuity and Security in physical and virtualized environment Includes an enhanced Appendix for additional information This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.

Oracle Advanced PL/SQL Developer Professional Guide

This book provides a comprehensive guide to the advanced features of PL/SQL, Oracle's procedural extension for SQL. It is especially designed for developers looking to master complex concepts, optimize code, and prepare for the Oracle 11g Advanced PL/SQL Professional certification (1Z0-146). Through clear explanations, practical examples, and exercises, you will advance your skills effectively. What this Book will help me do Master the use of advanced PL/SQL interface methods for robust database interactions. Implement Virtual Private Database settings with Fine Grained Access Control. Effectively use collections and data caching techniques to optimize your programs. Apply techniques to protect PL/SQL code from various security vulnerabilities, including injections. Implement result caching strategies and learn performance tuning methods to enhance application efficiency. Author(s) Saurabh K. Gupta is an experienced database professional specializing in Oracle technologies, with a focus on advanced PL/SQL development and optimization. He brings years of hands-on expertise to his writing, making complex subjects accessible for developers. In this book, he combines practical knowledge with certification-focused insights to guide readers towards programming excellence. Who is it for? This book is designed for PL/SQL programmers who have intermediate experience and are aiming to elevate their skills to a professional level. If you are preparing for the Oracle 1Z0-146 Professional certification or wish to deepen your understanding of advanced PL/SQL topics, this guide is ideal for you. A foundational knowledge of PL/SQL programming is assumed to fully benefit from the content.

IBM Cognos Business Intelligence 10: The Official Guide

The only authorized guide to IBM Cognos Business Intelligence v10.1 Updated for the latest release of the software, IBM Cognos Business Intelligence 10: The Official Guide explains how to create, implement, and manage an enterprise BI solution. Maximize all of the new and enhanced features, including the powerful modeling, monitoring, and analytics capabilities. Build and deliver reports that foster informed business decisions and better results. Filled with real-world examples and expert advice, this practical resource is ideal for anyone working with IBM Cognos Business Intelligence v10.1--from administrators to end users. Monitor performance using dashboards and scorecards Assign user roles and privileges Provide a single access point to application-specific data via Cognos Connection Access content from Microsoft Office applications and mobile devices Collect and analyze BI data in an interactive dashboard with Cognos Business Insight Use Cognos Administration tools for system management Implement appropriate security measures Create BI reports with relational and dimensional data using Business Insight Advanced Use Report Studio to build dimensional reports and statistical analyses Identify and deliver mission-critical information using Event Studio Monitor business performance with Metric Studio Create, modify, organize, and publish a model in Framework Manager Ensure report integrity with Lifecycle Manager

Beginning Microsoft® SQL Server® 2012 Programming

Get up to speed on the extensive changes to the newest release of Microsoft SQL Server The 2012 release of Microsoft SQL Server changes how you develop applications for SQL Server. With this comprehensive resource, SQL Server authority Robert Vieira presents the fundamentals of database design and SQL concepts, and then shows you how to apply these concepts using the updated SQL Server. Publishing time and date with the 2012 release, Beginning Microsoft SQL Server 2012 Programming begins with a quick overview of database design basics and the SQL query language and then quickly proceeds to show you how to implement the fundamental concepts of Microsoft SQL Server 2012. You'll explore the key additions and changes to this newest version, including conditional action constructs, enhanced controls for results paging, application integration with SharePoint and Excel, and development of BI applications. Covers new features such as SQL Azure for cloud computing, client-connectivity enhancements, security and compliance, data replication, and data warehouse performance improvements Addresses essential topics including managing keys, writing scripts, and working with store procedures Shares helpful techniques for creating and changing tables, programming with XML, and using SQL Server Reporting and Integration Services Beginning Microsoft SQL Server 2012 Programming demystifies even the most difficult challenges you may face with the new version of Microsoft SQL Server.

Handbook of Real-World Applications in Modeling and Simulation

Introduces various modeling and simulation methods and paradigms that are used to explain and solve the predominant challenges facing society Handbook of Real-World Applications in Modeling and Simulation provides a thorough explanation of modeling and simulation in the most useful, current, and predominant applied areas of transportation, homeland security, medicine, operational research, military science, and business modeling. Offering a cutting-edge and accessible presentation, this book discusses how and why the presented domains have become leading applications of modeling and simulation techniques. Contributions from leading academics and researchers integrate modeling and simulation theories, methods, and data to analyze challenges that involve technological and social issues. The book begins with an introduction that explains why modeling and simulation is a reliable analysis assessment tool for complex systems problems. Subsequent chapters provide an orientation to various modeling and simulation methods and paradigms that are used to explain and solve the predominant challenges across real-world applied domains. Additionally, the handbook: Provides a practical one-stop reference on modeling and simulation and contains an accessible introduction to key concepts and techniques Introduces, trains, and prepares readers from statistics, mathematics, engineering, computer science, economics, and business to use modeling and simulation in their studies and research Features case studies that are representative of fundamental areas of multidisciplinary studies and provides a concise look at the key concepts of modeling and simulation Contains a collection of original ideas on modeling and simulation to help academics and practitioners develop a multifunctional perspective Self-contained chapters offer a comprehensive approach to explaining each respective domain and include sections that explore the related history, theory, modeling paradigms, and case studies. Key terms and techniques are clearly outlined, and exercise sets allow readers to test their comprehension of the presented material. Handbook of Real-World Applications in Modeling and Simulation is an essential reference for academics and practitioners in the areas of operations research, business, management science, engineering, statistics, mathematics, and computer science. The handbook is also a suitable supplement for courses on modeling and simulation at the graduate level.

Professional Microsoft SQL Server 2012 Administration

An essential how-to guide for experienced DBAs on the most significant product release since 2005! Microsoft SQL Server 2012 will have major changes throughout the SQL Server and will impact how DBAs administer the database. With this book, a team of well-known SQL Server experts introduces the many new features of the most recent version of SQL Server and deciphers how these changes will affect the methods that administrators have been using for years. Loaded with unique tips, tricks, and workarounds for handling the most difficult SQL Server admin issues, this how-to guide deciphers topics such as performance tuning, backup and recovery, scaling and replication, clustering, and security. Serves as a must-have how-to guide on the new features of the 2012 release of Microsoft SQL Server Walks you through ways to manage and monitor SQL Server and automate administration Guides you through SQL Azure for cloud computing, data replication, and data warehouse performance improvements Addresses client-connectivity enhancements, new features that ensure high availability of mission-critical applications, and tighter integration with Excel and SharePoint for data analysis and reporting Highlights major changes to the suite of SQL Server BI tools, including integration, reporting, and analysis services Includes real-world case examples and best practices from Microsoft insiders If you're a database administrator eager to get started with the newest version of SQL Server, then this book is essential reading.

BizTalk Server 2010 Cookbook

Dive into the intricacies of BizTalk Server 2010 with this comprehensive cookbook. By learning from over 50 detailed recipes, you'll enhance both your technical skills in BizTalk implementation and guiding principles for setting up durable, efficient environments. Written by expert Steef-Jan Wiggers, this book provides practical models to create robust orchestration and messaging solutions. What this Book will help me do Learning to deploy robust and high-performing BizTalk environments with optimal settings. Enhancing orchestration designs using well-defined BizTalk patterns for scalability. Utilizing best practices for BizTalk artifact instrumentation and error handling. Strengthening knowledge of BizTalk messaging security and SOA pattern application. Expanding BizTalk solutions to integrate with modern cloud-based technologies. Author(s) Steef-Jan Wiggers is a recognized expert and Microsoft MVP in BizTalk Server. With extensive experience as both a developer and an administrator, Steef-Jan brings a wealth of practical knowledge to this book. His approach to teaching BizTalk is grounded in real-world applications, focusing on equipping professionals with actionable insights and clear guidance. Who is it for? This book is ideal for BizTalk developers and administrators who have foundational knowledge of BizTalk Server, SOA, and enterprise application integration concepts. Whether advancing professional ambitions, honing skills, or tackling specific BizTalk challenges, readers can rely on this book to deliver essential knowledge and actionable techniques.