talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

Oracle Database 11g Building Oracle XML DB Applications

Master the XML Programming Features in Oracle Database 11 g Develop, debug, and administer data-backed XML applications using the expert instruction and best practices in this Oracle Press guide. Oracle Database 11g: Building Oracle XML DB Applications discusses the latest development tools, technologies, and components. Find out how to set up Oracle XML Database (Oracle XML DB), build XML applications in Oracle JDeveloper 11 g, work with XSLT stylesheets, and incorporate full-text search. Troubleshooting, performance tuning, and security are also covered in this comprehensive resource. Create, store, and query XML types using Oracle XML DB Load XML documents into relational tables and define SQL views Parse and validate schema with Oracle XDK for Java and PL/SQL packages Merge documents, generate reports, and transform data using XSLT Construct applications from Oracle XML DB Web services Use Oracle JDeveloper 11 g to design and deploy XML applications Integrate Oracle Text and Oracle Secure Enterprise Search features Streamline the development process using Oracle Application Express

IBM Tivoli Directory Server for z/OS

This IBM® Redbooks® publication examines the IBM Tivoli® Directory Server for z/OS®. IBM Tivoli Directory Server is a powerful Lightweight Directory Access Protocol (LDAP) infrastructure that provides a foundation for deploying comprehensive identity management applications and advanced software architectures. This publication provides an introduction to the IBM Tivoli Directory Server for z/OS that provides a brief summary of its features and a examination of the possible deployment topologies. It discusses planning a deployment of IBM Tivoli Directory Server for z/OS, which includes prerequisites, planning considerations, and data stores, and provides a brief overview of the configuration process. Additional chapters provide a detailed discussion of the IBM Tivoli Directory Server for z/OS architecture that examines the supported back ends, discusses in what scenarios they are best used, and provides usage examples for each back end. The discussion of schemas breaks down the schema and provides guidance on extending it. A broad discussion of authentication, authorization, and security examines the various access protections, bind mechanisms, and transport security available with IBM Tivoli Directory Server for z/OS. This chapter also provides an examination of the new Password Policy feature. Basic and advanced replication topologies are also covered. A discussion on plug-ins provides details on the various types of plug-ins, the plug-in architecture, and creating a plug-in, and provides an example plug-in. Integration of IBM Tivoli Directory Server for z/OS into the IBM Workload Manager environment is also covered. This publication also provides detailed information about the configuration of IBM Tivoli Directory Server for z/OS. It discusses deploying IBM Tivoli Directory Server for z/OS on a single system, with examples of configuring the available back ends. Configuration examples are also provided for deploying the server in a Sysplex, and for both basic and advanced replication topologies. Finally it provides guidance on monitoring and debugging IBM Tivoli Directory Server for z/OS.

Oracle Application Express 4 Recipes

Oracle Application Express 4 Recipes provides an example-based approach to learning Application Express—the ground-breaking, rapid application development platform included with every Oracle Database license. The recipes format is ideal for the quick-study who just wants a good example or two to kick start their thinking and get pointed in the right direction. The recipes cover the gamut of Application Express development. Author and Application Express expert Edmund Zehoo shows how to create data entry screens, visualize data in the form of reports and charts, implement validation and back-end logic, and much more. Solutions are presented in an easy, problem/solution format from which you can copy and adapt for your own use. Detailed discussion for each solution deepens your understanding and aids in customizing the solutions to fit your particular development challenges. Teaches Application Express via an example-based format Takes you from beginner to intermediate level Shows how to build a fully-functional web store in just one hour What you'll learn Create web application forms and tables Customize application look and feel Visualize data via reports, calendars, maps, and charts Globalize applications in support of language and regional differences Implement complex business logic Optimize the performance of Application Express Protect applications from security threats Who this book is for Oracle Application Express 4 Recipes is aimed at web application developers, PL/SQL developers, and database administrators wishing to learn and use Oracle's groundbreaking tool for rapid development—Application Express. The book is a quick-study and is perfect for the reader who wants only a good example to work from, customize, and adapt.

Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation

This book, "Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation," serves as a comprehensive guide for understanding PeopleSoft Financials applications. It delves into core concepts, configurations, and business processes, providing practical, real-world scenarios to bridge theory and application. By mastering the content, readers will be prepared to successfully implement PeopleSoft Financials in complex organizational environments. What this Book will help me do Grasp the core principles of financial ERP systems and PeopleSoft's approach to effective financial application management. Learn to configure security settings to control access to system features, ensuring proper user management. Understand and implement crucial financial modules such as Billing, Accounts Payable, Accounts Receivable, and Asset Management. Develop strategies for budgeting and expense management through Commitment Control and the Expenses module. Gain hands-on experience with PeopleSoft's Setup Manager to navigate and complete implementation tasks efficiently. Author(s) Ranjeet Yadav brings extensive experience in implementing and working with PeopleSoft Financials across various industries. With an in-depth understanding of both the technical and functional aspects of PeopleSoft systems, he has crafted this book to be both accessible and informative for practitioners. Ranjeet's teaching approach focuses on practical knowledge, equipping his readers to tackle real-world challenges confidently. Who is it for? This book is well-suited for functional implementation analysts, business analysts, and business users starting with PeopleSoft applications. It is ideal for individuals aiming to enhance their PeopleSoft Financials skills and gain a comprehensive understanding of its implementation. If you're looking to build a strong foundation in PeopleSoft systems and improve your organization's financial operations, this book is tailored to your needs.

Oracle Fusion Middleware 11g Architecture and Management

Master All Aspects of Oracle Fusion Middleware Management Govern a unified platform for agile, intelligent business applications using the detailed information contained in this Oracle Press book. Oracle Fusion Middleware 11g Architecture and Management explains the entire suite of Oracle Fusion Middleware components and lays out core use cases, best practices, and step-by-step administrative instructions. Discover how to provision servers and clusters, configure Web services, manage portals, and optimize the performance of the full stack of Oracle Fusion Middleware components. Monitoring, diagnosing, and security are also covered in this definitive resource. Understand key architectural concepts behind Oracle Fusion Middleware 11 g Create and deploy Oracle WebLogic Server domains and clusters Set up and manage applications built using Oracle Application Development Framework Maximize the value of your Oracle SOA Suite environments Manage portals and Enterprise 2.0 services from Oracle WebCenter Secure deployments with Oracle Platform Security Services and Oracle Identity Management Understand Oracle Exalogic and Oracle Virtual Assembly Builder

Expert Oracle Application Express

Expert Oracle Application Express brings you groundbreaking insights into developing with Oracle's enterprise-level, rapid-development tool from some of the best practitioners in the field today. Oracle Application Express (APEX) is an entirely web-based development framework that is built into every edition of Oracle Database. The framework rests upon Oracle's powerful PL/SQL language, enabling power users and developers to rapidly develop applications that easily scale to hundreds, even thousands of concurrent users. The 13 authors of Expert Oracle Application Express build their careers around APEX. They know what it takes to make the product sing—developing secure applications that can be deployed globally to users inside and outside a large enterprise. The authors come together in this book to share some of their deepest and most powerful insights into solving the difficult problems surrounding scalability, globalization, configuration and lifecycle management, and more. You'll learn about debugging and performance, deep secrets to customizing your application user interface, how to secure applications from intrusion, and about deploying globally in multiple languages. Expert Oracle Application Express is truly a book that will move you and your skillset a big step towards the apex of Application Express development. Presents best-practices and development insights from leading experts in the field Addresses globalization, scalability, security, and other concerns of enterprise-level development Shows how to customize APEX for your own application needs What you'll learn Solve tough problems in scalability in order to serve thousands of users Design applications to sidestep performance problems and easily scale upwards Deploy applications globally while respecting linguistic and cultural differences Customize applications by exploiting APEX's roots in PL/SQL Reduce the stress of managing application lifecycle and configuration Secure outwardly-facing applications and their data from intrusion Who this book is for Expert Oracle Application Express is aimed at APEX developers who seek the deepest possible knowledge of Oracle Application Express and how to develop with it. Readers should know and be proficient with APEX, and be prepared to expend some mental energy in absorbing the high-end material in this book.

Sams Teach Yourself SQL in 24 Hours, Fifth Edition

Master all the fundamentals of modern SQL -- hands-on, step-by-step! ¿ The up-to-the-minute SQL tutorial for everyone who wants to create applications, query data, or manage databases Updated to cover the latest ANSI/ISO standards, plus powerful Oracle and SQL Server extensions Covers everything from the basics through optimization, security, and enterprise techniques Step-by-step instructions, examples, quizzes, exercises, and tips In just 24 sessions of one hour or less, beginning-to-intermediate-level readers learn how to use SQL to build effective databases, efficiently retrieve data, and manage everything from performance to security! Using this book's straightforward, step-by-step approach, you learn hands-on, through practical examples based on the free, open source MySQL database. One step at a time, you discover how to define efficient database structures, objects, and tables edit data and tables manage transactions write effective queries categorize, summarize, sort, group, and restructure data use joins and subqueries manage databases, users, and security use views, synonyms, and system catalogs extend SQL to the enterprise and Internet even master important Oracle and Microsoft SQL Server extensions. Step-by-step instructions carefully walk through common questions, issues, and tasks... Q and As, Quizzes, and Exercises help you build and test your knowledge... Notes, Tips, and Cautions point out shortcuts, solutions, and problems to avoid. Each lesson builds on what you've already learned, delivering a strong real-world foundation for success with any relational database environment or application!

IBM Converged Switch B32

This IBM® Redbooks® document introduces the IBM Converged Switch B32. This switch supports Fibre Channel over Ethernet (FCoE), Fibre Channel, Converged Enhanced Ethernet (CEE), and traditional Ethernet protocol connectivity for servers and storage. FCoE is a new protocol that can expand Fibre Channel into the Ethernet environment, and it helps to combine and leverage the advantages of two technologies, Fibre Channel protocol and Ethernet. Features of the IBM Converged Switch B32 include: A 32-port multiprotocol switch for server I/O consolidation Enterprise-class availability for business continuance Improved return on investment and investment protection Fabric security for mission-critical information

How to Cheat at Securing SQL Server 2005

The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible. Provides the multi-tasked Sys Admin with the essential information needed to perform the daily tasks Covers SQL Server 2005, which is a massive product with significant challenges for IT managers Emphasizes best-practice security measures

Getting Started with the IBM Smart Analytics System 9600

The IBM® Smart Analytics System 9600 is a single, end-to-end business analytics solution to accelerate data warehousing and business intelligence initiatives. It provides integrated hardware, software, and services that enable enterprise customers to quickly and cost-effectively deploy business-changing analytics across their organizations. As a workload-optimized system for business analytics, it leverages the strengths of the System z® platform to drive: Significant savings in hardware, software, operating, and people costs to deliver a complete range of data warehouse and BI capabilities Faster time to value with a reduction in the time and speed associated with deploying Business Intelligence Industry-leading scalability, reliability, availability, and security Simplified and faster access to the data on System z

Oracle 10g Developing Media Rich Applications

Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the foundation of multimedia database applications. With the release of Oracle8 Database in 1997, Oracle became the first commercial database with integrated multimedia technology for application developers. Since that time, Oracle has enhanced and extended these features to include native support for image, audio, video and streaming media storage; indexing, retrieval and processing in the Oracle Database, Application Server; and development tools. Databases are not only words and numbers for accountants, but they also should utilize a full range of media to satisfy customer needs, from race car engineers, to manufacturing processes to security. The full range of audio, video and integration of media into databases is mission critical to these applications. This book details the most recent features in Oracle’s multimedia technology including those of the Oracle10gR2 Database and the Oracle9i Application Server. The technology covered includes: object relational media storage and services within the database, middle tier application development interfaces, wireless delivery mechanisms, and Java-based tools. * Gives broad coverage to integration of multimedia features such as audio and instrumentation video, from race cars to analyze performance, to voice and picture recognition for security data bases. As well as full multimedia for presentations * Includes field tested examples in enterprise environments * Provides coverage in a thorough and clear fashion developed in a London University Professional Course

SQL All-in-One For Dummies®, 2nd Edition

The soup-to-nuts guide on all things SQL! SQL, or structured query language, is the international standard language for creating and maintaining relational databases. It is the basis of all major databases in use today and is essential for the storage and retrieval of database information. This fun and friendly guide takes SQL and all its related topics and breaks it down into easily digestible pieces for you to understand. You'll get the goods on relational database design, development, and maintenance, enabling you to start working with SQL right away! Provides an overview of the SQL language and examines how it is integral for the storage and retrieval of database information Includes updates to SQL standards as well as any new features Explores SQL concepts, relational database development, SQL queries, data security, database tuning, and more Addresses the relationship between SQL and programming as well as SQL and XML If you're looking for an up-to-date sequel to the bestelling first edition of SQL All-in-One For Dummies, then this is the book for you!

Microsoft SQL Server 2008 R2 Master Data Services

Best Practices for Deploying and Managing Master Data Services (MDS) Effectively manage master data and drive better decision making across your enterprise with detailed instruction from two MDS experts. Microsoft SQL Server 2008 R2 Master Data Services Implementation & Administration shows you how to use MDS to centralize the management of key data within your organization. Find out how to build an MDS model, establish hierarchies, govern data access, and enforce business rules. Legacy system integration and security are also covered. Real-world programming examples illustrate the material presented in this comprehensive guide. Create a process-agnostic solution for managing your business domains Learn how to take advantage of the data modeling capabilities of MDS Manage hierarchies and consolidations across your organization Import data by using SQL Server Integration Services and T-SQL statements Ensure data accuracy and completeness by using business rules and versioning Employ role-based security at functional, object, and attribute levels Design export views and publish data to subscribing systems Use Web services to progrmmatically interact with your implementation

IBM System Storage b-type Multiprotocol Routing: An Introduction and Implementation

The rapid spread and adoption of production storage area networks (SANs) has fueled the need for multiprotocol routers. The routers provide improved scalability, security, and manageability by enabling devices in separate SAN fabrics to communicate without merging fabrics into a single, large SAN fabric. This capability enables clients to initially deploy separate SAN solutions at the departmental and data center levels. Then, clients can consolidate these separate solutions into large enterprise SAN solutions as their experience and requirements grow and change. Alternatively, multiprotocol routers can help to connect existing enterprise SANs for a variety of reasons. For instance, the introduction of Small Computer System Interface over IP (iSCSI) provides for the connection of low-end, low-cost hosts to enterprise SANs. The use of an Internet Protocol (IP) in the Fibre Channel (FC) environment provides for resource consolidation and disaster recovery planning over long distances. And the use of FC-FC routing services provides connectivity between two or more fabrics without having to merge them into a single SAN. This IBM® Redbooks® publication targets storage network administrators, system designers, architects, and IT professionals who sell, design, or administer SANs. It introduces you to products, concepts, and technology in the IBM System Storage™ SAN Routing portfolio, which is based on Brocade products and technology. This book shows the features of these products and examples of how you can deploy and use them.

Tivoli Integration Scenarios

This IBM® Redbooks® publication provides a broad view of how Tivoli® system management products work together in several common scenarios. You must achieve seamless integration for operations personnel to work with the solution. This integration is necessary to ensure that the product can be used easily by the users. Product integration contains multiple dimensions, such as security, navigation, data and task integrations. Within the context of the scenarios in this book, you see examples of these integrations. The scenarios implemented in this book are largely based on the input from the integration team, and several clients using IBM products. We based these scenarios on common real-life examples that IT operations often have to deal with. Of course, these scenarios are only a small subset of the possible integration scenarios that can be accomplished by the Tivoli products, but they were chosen to be representative of the integration possibilities using the Tivoli products. We discuss these implementations and benefits that are realized by these integrations, and also provide sample scenarios of how these integrations work. This book is a reference guide for IT architects and IT specialists working on integrating Tivoli products in real-life environments.

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made information technology (IT) and the Internet a vital issued for public and private enterprises. The downside is that this increased level of complexity and vulnerability presents a daunting challenge for enterprise and personal security. Internet Searches for Vetting, Investigations, and Open-Source Intelligence provides an understanding of the implications of the activities and data documented by individuals on the Internet. It delineates a much-needed framework for the responsible collection and use of the Internet for intelligence, investigation, vetting, and open-source information. This book makes a compelling case for action as well as reviews relevant laws, regulations, and rulings as they pertain to Internet crimes, misbehaviors, and individuals’ privacy. Exploring technologies such as social media and aggregate information services, the author outlines the techniques and skills that can be used to leverage the capabilities of networked systems on the Internet and find critically important data to complete an up-to-date picture of people, employees, entities, and their activities. Outlining appropriate adoption of legal, policy, and procedural principles—and emphasizing the careful and appropriate use of Internet searching within the law—the book includes coverage of cases, privacy issues, and solutions for common problems encountered in Internet searching practice and information usage, from internal and external threats. The book is a valuable resource on how to utilize open-source, online sources to gather important information and screen and vet employees, prospective employees, corporate partners, and vendors.

Securing SQL Server

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing an SQL server from home; physical security; and testing network security. The remaining chapters cover database encryption; SQL password security; SQL injection attacks; database backup security; security auditing; and server rights. The Appendix features checklists that database administrators can use to pass external audits. Named a 2011 Systems Administration Book by InfoSec Reviews Author Denny Cherry is an MVP by Microsoft for his expertise in the SQL Server product Learn expert techniques to protect your SQL database environment Discover how to identify what an intruder accessed or damaged

Telemedicine Technologies: Information Technologies in Medicine and Telehealth

This book brings together a broad range of topics demonstrating how information and wireless technologies can be used in healthcare In this book, the authors focus on how medical information can be reliably transmitted through wireless communication networks. It explains how they can be optimized to carry medical information in various situations by utilizing readily available traditional wireless local area network (WLAN) and broadband wireless access (BWA) systems. In addition, the authors discuss consumer healthcare technology, which is becoming more popular as reduction in manufacturing cost of electronics products makes healthcare products more affordable to the general public. Finally, the book explores topics such as communication networks and services, patient monitoring, information processing, system deployment, data security and privacy, information technology in alternative medicine, multimedia and health informatics, and caring for the community. Key Features: Focuses on the transmission of medical information over wireless communication networks, and addresses topics such as communication networks and services, patient monitoring, information processing, system deployment, data security and privacy, and many others Provides an in-depth introduction to the various factors that need to be considered for supporting healthcare services with information technology Covers advancements in topics such as RFID in healthcare Discusses medical signal processing as well as ECG and signal processing techniques This book will be of interest to advanced students and professors in biomedical engineering, bioinformatics, and information engineering. Medical and IT professionals involved in specifying new facilities, healthcare practitioners in telemedicine, researchers in wireless communications and information technology, and network administrators will also find this book insightful.

Pro SQL Azure

SQL Azure represents Microsoft's cloud-based delivery of its enterprise-caliber, SQL Server database management system (formerly under the code name "Oslo"). Pro SQL Azure introduces you to this new platform, showing you how to program and administer it in a variety of cloud computing scenarios. You'll learn to program SQL Azure from Silverlight, ASP.NET, WinForms, and from SQL Reporting Services. You'll also understand how to manage the platform by planning for scalability, troubleshooting performance issues, and implementing strong security. Shows how to use SQL Azure from Silverlight, ASP.NET, and more Covers management, scalability, and troubleshooting Addresses the all-important issue of securing your data

Legal Issues in Information Security

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!

Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. Part 1 of this book discusses fundamental security and privacy concepts. Part 2 examines recent US laws that address information security and privacy. And Part 3 considers security and privacy for organizations.