talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

Oracle Database 11g Release 2 Performance Tuning Tips & Techniques

Implement Proven Database Optimization Solutions Systematically identify and eliminate database performance problems with help from Oracle Certified Master Richard Niemiec. Filled with real-world case studies and best practices, Oracle Database 11g Release 2 Performance Tuning Tips & Techniques details the latest monitoring, troubleshooting, and optimization methods. Find out how to find and fix bottlenecks, configure storage devices, execute effective queries, and develop bug-free SQL and PL/SQL code. Testing, reporting, and security enhancements are also covered in this Oracle Press guide. Properly index and partition Oracle Database 11 g Release 2 Work with Oracle Exadata and Oracle Exalogic Elastic Cloud Efficiently manage disk drives, RAID arrays, and memory Tune queries with Oracle SQL hints and the TRACE utility Troubleshoot databases using V$ views and X$ tables Distribute workload using Oracle Real Application Testing Generate reports using Oracle's Statspack and Automatic Workload Repository tools Use sar, vmstat, and iostat to monitor system statistics “This is a timely update of Rich’s classic book on Oracle Database performance tuning to cover hot new topics like Oracle Database 11g Release 2 and Oracle Exadata. This is a must-have for DBAs moving to these new products.” --Andrew Mendelsohn, Senior Vice President, Oracle Database Server Technologies

IBM DB2 9.7 Advanced Application Developer Cookbook

"IBM DB2 9.7 Advanced Application Developer Cookbook" is your guide to mastering advanced techniques for database application development with IBM DB2. This practical book provides over 70 hands-on recipes that cover everything from performance tuning to utilizing the latest DB2 features. By diving into these solutions, you will be able to design secure, robust, and cutting-edge DB2 applications. What this Book will help me do Implement and leverage new features of DB2 9.7 for enhanced application development. Apply performance tuning techniques to improve the efficiency of your database applications. Design secure DB2 applications while understanding advanced security configurations. Migrate Oracle database objects to DB2, enabling Oracle application support on DB2. Utilize advanced DB2 capabilities such as pureXML efficiently for Web 2.0 and SOA integrations. Author(s) The author is a seasoned database professional with extensive experience in IBM DB2 development and administration. Having worked on numerous high-profile DB2 applications, their expertise spans the full application lifecycle, from design to optimization. They present complex technical concepts in a clear and approachable way, ensuring that readers can easily grasp and apply advanced database techniques. Who is it for? This book is ideal for professional IBM DB2 developers who wish to deepen their expertise in advanced application development. It's suited for individuals with a foundational understanding of DB2 who aim to leverage its powerful features for building robust and optimized applications. If you are tasked with migrating Oracle applications to DB2 or enhancing DB2's performance for high-demand systems, this guide is for you.

An Introduction to IMS: Your Complete Guide to IBM Information Management System

IBM’s Definitive One-Stop Guide to IMS Versions 12, 11, and 10: for Every IMS DBA, Developer, and System Programmer Over 90% of the top Fortune® 1000 companies rely on IBM’s Information Management System (IMS) for their most critical IBM System z® data management needs: 50,000,000,000+ transactions run through IMS databases every day. What’s more, IBM continues to upgrade IMS: Versions 12, 11, and 10 meet today’s business challenges more flexibly and at a lower cost than ever before. In An Introduction to IMS, Second Edition, leading IBM experts present the definitive technical introduction to these versions of IMS. More than a complete tutorial, this book provides up-to-date examples, cases, problems, solutions, and a complete glossary of IMS terminology. Prerequisite reading for the current IBM IMS Mastery Certification Program, it reflects major recent enhancements such as dynamic information generation; new access, interoperability and development tools; improved SOA support; and much more. Whether you’re a DBA, database developer, or system programmer, it brings together all the knowledge you’ll need to succeed with IMS in today’s mission critical environments. Coverage includes What IMS is, how it works, how it has evolved, and how it fits into modern enterprise IT architectures Providing secure access to IMS via IMS-managed application programs Understanding how IMS and z/OS® work together to use hardware and software more efficiently Setting up, running, and maintaining IMS Running IMS Database Manager: using the IMS Hierarchical Database Model, sharing data, and reorganizing databases Understanding, utilizing, and optimizing IMS Transaction Manager IMS application development: application programming for the IMS Database and IMS Transaction Managers, editing and formatting messages, and programming applications in Java™ IMS system administration: the IMS system definition process, customizing IMS, security, logging, IMS operations, database and system recovery, and more IMS in Parallel Sysplex® environments: ensuring high availability, providing adequate capacity, and balancing workloads

Integrating IBM Security and SAP Solutions

Many large and medium-sized organizations have made strategic investments in the SAP NetWeaver technology platform as their primary application platform. In fact, SAP software is used to manage many core business processes and data. As a result, it is critical for all organizations to manage the life cycle of user access to the SAP applications while adhering to security and risk compliance requirements. In this IBM® Redbooks® publication, we discuss the integration points into SAP solutions that are supported by the IBM Security access and identity management product capabilities. IBM Security software offers a range of identity management (IdM) adapters and access management components for SAP solutions that are available with IBM Tivoli® Identity Manager, IBM Tivoli Directory Integrator, IBM Tivoli Directory Server, IBM Access Manager for e-business, IBM Tivoli Access Manager for Enterprise Single Sign-On, and IBM Tivoli Federated Identity Manager. This book is a valuable resource for security officers, consultants, administrators, and architects who want to understand and implement an identity management solution for an SAP environment.

Microsoft® SQL Server® 2012: Pocket Consultant

Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of SQL Server. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the focused information you need to save time and get the job done—whether at your desk or in the field! Get fast facts to: Manage SQL Server services and clients Configure, manage, and tune servers Implement policy-based management Administer security and access Monitor server activity and tune performance Automate maintenance Perform backups and recovery

Running SAP Solutions with IBM DB2 10 for z/OS on the IBM zEnterprise System

This IBM® Redbooks® publication highlights the key enhancements of IBM DB2® 10 for SAP. These enhancements include performance, scalability for several threads, new and more granular privileges, and auditing capabilities. This book is for IT specialists and architects who are interested in how SAP NetWeaver v7.3 interacts and uses the new features of DB2 10 for z/OS®. This book focuses on the SAP Business Suite of applications and how these applications run on IBM zEnterprise™ infrastructures. It begins with a brief overview of the SAP NetWeaver products and hardware and explains the software implementations when DB2 10 for z/OS is used as the database server. It highlights the SAP NetWeaver system architecture. It continues by describing how SAP products benefit from the recent developments by IBM on the hardware side with the zEnterprise 196 (z196) server, in z/OS, and in DB2 10 for z/OS. In addition, this Redbooks publication explains how you can extend an SAP system or change a server configuration by using the IBM zEnterprise Unified Resource Manager. It explores SAP high availability concepts, virtualization, and security enhancements of DB2 10 for SAP solutions.

Microsoft SQL Server 2012 A Beginners Guide 5/E, 5th Edition

Essential Microsoft SQL Server 2012 Skills Made Easy Get up and running on Microsoft SQL Server 2012 in no time with help from this thoroughly revised, practical resource. Filled with real-world examples and hands-on exercises, Microsoft SQL Server 2012: A Beginner's Guide, Fifth Edition starts by explaining fundamental relational database system concepts. Then, you'll learn how to write Transact-SQL statements, execute simple and complex database queries, handle system administration and security, and use the powerful analysis, business intelligence, and reporting tools. XML, spatial data, and full-text search are also covered in this step-by-step tutorial. Install, configure, and customize SQL Server 2012 Create and modify database objects with Transact SQL statements Write stored procedures and user-defined functions Handle backup and recovery Automate administrative tasks Tune your database system for optimal performance, availability, and reliability Implement security measures using authentication, encryption, and authorization Work with SQL Server Analysis Services, SQL Server Reporting Services, and other business intelligence tools Store, display, and query XML documents Manage spatial data Query documents using MS Full-Text Search (FTS)

Security on IBM z/VSE

One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers, are not only difficult to detect and prevent—they could have been using resources without the business even being aware that they are there. This IBM Redbooks® publication was written to assist z/VSE support and security personnel in providing the enterprise with a safe, secure and manageable environment. This book provides an overview of the security provided by z/VSE and the processes for the implementation and configuration of z/VSE security components, Basic Security Manager (BSM), IBM CICS® security, TCP/IP security, single sign-on using LDAP, and connector security.

Implementing an InfoSphere Optim Data Growth Solution

Today, organizations face tremendous challenges with data explosion and information governance. InfoSphere™ Optim™ solutions solve the data growth problem at the source by managing the enterprise application data. The Optim Data Growth solutions are consistent, scalable solutions that include comprehensive capabilities for managing enterprise application data across applications, databases, operating systems, and hardware platforms. You can align the management of your enterprise application data with your business objectives to improve application service levels, lower costs, and mitigate risk. In this IBM® Redbooks® publication, we describe the IBM InfoSphere Optim Data Growth solutions and a methodology that provides implementation guidance from requirements analysis through deployment and administration planning. We also discuss various implementation topics including system architecture design, sizing, scalability, security, performance, and automation. This book is intended to provide various systems development professionals, Data Solution Architects, Data Administrators, Modelers, Data Analysts, Data Integrators, or anyone who has to analyze or integrate data structures, a broad understanding about IBM InfoSphere Optim Data Growth solutions. By being used in conjunction with the product manuals and online help, this book provides guidance about implementing an optimal solution for managing your enterprise application data.

PHP and MySQL® 24-Hour Trainer

Step-by-step lessons for using PHP and MySQL in a unique book-and-video combination Assuming no previous experience with PHP or MySQL, this book-and-video package is ideal reading for anyone who wants to go beyond HTML/CSS in order to provide clients with the most dynamic web sites possible. The approachable tone breaks down the basics of programming and PHP and MySQL in individual lessons starting with the installation of the programs necessary to run PHP. You begin with a static web site and then watch and learn as PHP functionality is added as you work through the lessons. When working with databases, the MySQL database is introduced with demonstrations that show how to interact with it. The accompanying videos enhance your learning experience, as each lesson in the book is portrayed in the video exercises. Lessons include: Getting started with PHP Setting up your workspace Adding PHP to a web page Learning PHP syntax Working with variables Debugging code Working with complex data Making decisions Repeating program steps Learning about scope Reusing code with functions Creating forms Introducing object-oriented programming Defining classes Using classes Using advanced techniques Handling errors Writing secure code Introducing databases Introducing MySQL Creating and connecting to the Creating tables Entering data Selecting data Using multiple tables Changing data Deleting data Preventing database security issues Creating user logins Turn the case study into a content management system Note: As part of the print version of this title, video lessons are included on DVD. For e-book versions, video lessons can be accessed at wrox.com using a link provided in the interior of the e-book.

IT Security Policy Management Usage Patterns Using IBM Tivoli Security Policy Manager

In a growing number of organizations, policies are the key mechanism by which the capabilities and requirements of services are expressed and made available to other entities. The goals established and driven by the business need to be consistently implemented, managed and enforced by the service-oriented infrastructure; expressing these goals as policy and effectively managing this policy is fundamental to the success of any IT and application transformation. First, a flexible policy management framework must be in place to achieve alignment with business goals and consistent security implementation. Second, common re-usable security services are foundational building blocks for SOA environments, providing the ability to secure data and applications. Consistent IT Security Services that can be used by different components of an SOA run time are required. Point solutions are not scalable, and cannot capture and express enterprise-wide policy to ensure consistency and compliance. In this IBM® Redbooks® publication, we discuss an IBM Security policy management solution, which is composed of both policy management and enforcement using IT security services. We discuss how this standards-based unified policy management and enforcement solution can address authentication, identity propagation, and authorization requirements, and thereby help organizations demonstrate compliance, secure their services, and minimize the risk of data loss. This book is a valuable resource for security officers, consultants, and architects who want to understand and implement a centralized security policy management and entitlement solution.

IBM IMS Version 12 Technical Overview

IBM® Information Management System (IMS™) provides leadership in performance, reliability, and security to help you implement the most strategic and critical enterprise applications. IMS also keeps pace with the IT industry. IMS, Enterprise Suite 2.1, and IMS Tools continue to evolve to provide value and meet the needs of enterprise customers. With IMS 12, integration and open access improvements provide flexibility and support business growth requirements. Manageability enhancements help optimize system staff productivity by improving ease of use and autonomic computing facilities and by providing increased availability. Scalability improvements have been made to the well-known performance, efficiency, availability, and resilience of IMS by using 64-bit storage. IBM IMS Enterprise Suite for z/OS® V2.1 components enhance the use of IMS applications and data. In this release, components (either orderable or downloaded from the web) deliver innovative new capabilities for your IMS environment. They enhance connectivity, expand application development, extend standards and tools for a service-oriented architecture (SOA), ease installation, and provide simplified interfaces. This IBM Redbooks® publication explores the new features of IMS 12 and Enterprise Suite 2.1 and provides an overview of the IMS tools. In addition, this book highlights the major new functions and facilitates database administrators in their planning for installation and migration.

Oracle Database 11g & MySQL 5.6 Developer Handbook

Master Application Development in a Mixed-Platform Environment Build powerful database applications in a mixed environment using the detailed information in this Oracle Press guide. Oracle Database 11g & MySQL 5.6 Developer Handbook lays out programming strategies and best practices for seamlessly operating between the two platforms. Find out how to migrate databases, port SQL dialects, work with Oracle MySQL databases, and configure effective queries. Security, monitoring, and tuning techniques are also covered in this comprehensive volume. Understand Oracle Database 11 g and MySQL 5.6 architecture Convert databases between platforms and ensure transactional integrity Create tables, sequences, indexes, views, and user accounts Build and debug PL/SQL, SQL*Plus, SQL/PSM, and MySQL Monitor scripts Execute complex queries and handle numeric and date mathematics Merge data from source tables and set up virtual directories

IBM zEnterprise 196 Technical Guide

The popularity of the Internet and the affordability of IT hardware and software have resulted in an explosion of applications, architectures, and platforms. Workloads have changed. Many applications, including mission-critical ones, are deployed on a variety of platforms, and the System z® design has adapted to this change. It takes into account a wide range of factors, including compatibility and investment protection, to match the IT requirements of an enterprise. The zEnterprise System consists of the IBM zEnterprise 196 central processor complex, the IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension. The z196 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The z196 Model M80 provides up to 1.6 times the total system capacity of the z10™ EC Model E64, and all z196 models provide up to twice the available memory of the z10 EC. The zBX infrastructure works with the z196 to enhance System z virtualization and management through an integrated hardware platform that spans mainframe, POWER7™, and System x® technologies. Through the Unified Resource Manager, the zEnterprise System is managed as a single pool of resources, integrating system and workload management across the environment. This IBM® Redbooks® publication provides an overview of the zEnterprise System and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. This book is intended for systems engineers, consultants, planners, and anyone wanting to understand the zEnterprise System functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM System z technology and terminology. The changes to this edition are based on the System z hardware announcement dated July 12, 2011.

IBM zEnterprise 114 Technical Guide

The popularity of the Internet and the affordability of IT hardware and software have resulted in an explosion of applications, architectures, and platforms. Workloads have changed. Many applications, including mission-critical ones, are deployed on a variety of platforms, and the System z® design has adapted to this change. It takes into account a wide range of factors, including compatibility and investment protection, to match the IT requirements of an enterprise. This IBM® Redbooks® publication discusses the IBM zEnterprise System, an IBM scalable mainframe server. IBM is taking a revolutionary approach by integrating separate platforms under the well-proven System z hardware management capabilities, while extending System z qualities of service to those platforms. The zEnterprise System consists of the IBM zEnterprise 114 central processor complex, the IBM zEnterprise Unified Resource Manager, and the IBM zEnterprise BladeCenter® Extension. The z114 is designed with improved scalability, performance, security, resiliency, availability, and virtualization. The z114 provides up to 18% improvement in uniprocessor speed and up to a 12% increase in total system capacity for z/OS®, z/VM®, and Linux on System z over the z10™ Business Class (BC). The zBX infrastructure works with the z114 to enhance System z virtualization and management through an integrated hardware platform that spans mainframe, POWER7™, and System x technologies. The federated capacity from multiple architectures of the zEnterprise System is managed as a single pool of resources, integrating system and workload management across the environment through the Unified Resource Manager. This book provides an overview of the zEnterprise System and its functions, features, and associated software support. Greater detail is offered in areas relevant to technical planning. This book is intended for systems engineers, consultants, planners, and anyone wanting to understand the zEnterprise System functions and plan for their usage. It is not intended as an introduction to mainframes. Readers are expected to be generally familiar with existing IBM System z technology and terminology.

Privacy and Big Data

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today—truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Privacy and Big Data introduces you to the players in the personal data game, and explains the stark differences in how the U.S., Europe, and the rest of the world approach the privacy issue. You'll learn about: Collectors: social networking titans that collect, share, and sell user data Users: marketing organizations, government agencies, and many others Data markets: companies that aggregate and sell datasets to anyone Regulators: governments with one policy for commercial data use, and another for providing security

MariaDB Crash Course

This first-to-market tutorial covers everything beginners need to succeed with MariaDB, the open, community-based branch of MySQL. Master trainer Ben Forta introduces all the essentials through a series of quick, easy-to-follow, hands-on lessons. Instead of belaboring database theory and relational design, Forta focuses on teaching solutions for the majority of SQL users who simply want to interact with data. Forta covers all this, and more: Using the MariaDB toolset * Retrieving and sorting data Filtering data using comparisons, wildcards, and full text searching Analyzing data with aggregate functions Performing insert, update, and delete operations Joining relational tables using inner, outer, and self joins Combining queries using unions * Using views Creating and modifying tables, and accessing table schemas Working with stored procedures, cursors, and other advanced database features Managing databases, users, and security privileges This book was reviewed and is supported by MariaDB's developers, Monty Program AB. It contains a foreword by project founder Monty Widenius, primary developer of the original version of MySQL.

Security Functions of IBM DB2 10 for z/OS

IBM® DB2® 9 and 10 for z/OS® have added functions in the areas of security, regulatory compliance, and audit capability that provide solutions for the most compelling requirements. DB2 10 enhances the DB2 9 role-based security with additional administrative and other finer-grained authorities and privileges. This authority granularity helps separate administration and data access that provide only the minimum appropriate authority. The authority profiles provide better separation of duties while limiting or eliminating blanket authority over all aspects of a table and its data. In addition, DB2 10 provides a set of criteria for auditing for the possible abuse and overlapping of authorities within a system. In DB2 10, improvements to security and regulatory compliance focus on data retention and protecting sensitive data from privileged users and administrators. Improvements also help to separate security administration from database administration. DB2 10 also lets administrators enable security on a particular column or particular row in the database complementing the privilege model. This IBM Redbooks® publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators.

Practical Oracle Security

This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database. The only practical, hands-on guide for securing your Oracle database published by independent experts. Your Oracle database does not exist in a vacuum, so this book shows you how to securely integrate your database into your enterprise.

IBM z/OS Mainframe Security and Audit Management Using the IBM Security zSecure Suite

Every organization has a core set of mission-critical data that must be protected. Security lapses and failures are not simply disruptions—they can be catastrophic events, and the consequences can be felt across the entire organization. As a result, security administrators face serious challenges in protecting the company’s sensitive data. IT staff are challenged to provide detailed audit and controls documentation at a time when they are already facing increasing demands on their time, due to events such as mergers, reorganizations, and other changes. Many organizations do not have enough experienced mainframe security administrators to meet these objectives, and expanding employee skillsets with low-level mainframe security technologies can be time-consuming. The IBM® Security zSecure suite consists of multiple components designed to help you administer your mainframe security server, monitor for threats, audit usage and configurations, and enforce policy compliance. Administration, provisioning, and management components can significantly reduce administration, contributing to improved productivity, faster response time, and reduced training time needed for new administrators. This IBM Redbooks® publication is a valuable resource for security officers, administrators, and architects who wish to better understand their mainframe security solutions.