talk-data.com talk-data.com

Topic

Cyber Security

cybersecurity information_security data_security privacy

2078

tagged

Activity Trend

297 peak/qtr
2020-Q1 2026-Q1

Activities

2078 activities · Newest first

Lotus Workplace 2.0.1 Products: Deployment Guide

IBM Lotus software has created IBM Lotus Workplace, an integrated family of products based on open standards. Lotus Workplace combines market-leading collaborative components that can be used with a variety of security-rich clients for simplified access and interaction with other people and a host of collaborative applications such as e-mail, calendaring and scheduling, instant messaging, Web conferencing, team spaces, document and Web content management, and e-learning. IBM Lotus Workplace products include: This IBM Redbooks publication is an installation and deployment guide for the Lotus Workplace 2.0.1 platform. We provide detailed installation procedures for installing the Lotus Workplace products on both a Microsoft Windows 2000 server and a Linux server running SUSE LINUX Enterprise Server 8.1. We also discuss important deployment and planning scenarios, as well as tips, best practices, and techniques for troubleshooting errors during installation.

Using MQSeries for VSE

This IBM Redbooks publication will help you get started with MQSeries for VSE V2R1.2. It explores why and how to use MQSeries with the VSE operating system and shows why MQSeries is more than just another queuing system. This book is meant for those who know VSE but have only a slight understanding of MQSeries and how to use it. This book contains an overview of the MQSeries installation and configuration, explains how to connect clients to servers and servers to servers, how to trigger applications, and the MQI programming interface. It describes the command interface, how the libraries are used, and how to edit, compile, test, and debug a program. This book also provides information about performance and security for the MQSeries for VSE V2.1.2. It explains what has to be done to use MQSeries for communication between VSE and other platforms, such as OS/390 and Windows XP. Examples are given to guide the user through the administrative process of defining connections between different systems, and information regarding security, backup, and recovery is also provided.

Understanding DB2®: Learning Visually with Examples

The Easy, Visual Guide to IBM DB2 V8.2 IBM DB2 Universal Database™ V8.2 for Linux®, UNIX®, and Windows® is a flexible, scalable, cost-effective, and easy-to-use enterprise database. Now, one book makes DB2 even easier. teaches DB2 V8.2 visually, step by step, with dozens of examples and case studies drawn from the authors' unsurpassed experience as DB2 consultants at IBM. Understanding DB2 doesn't just present the big picture. It thoroughly introduces every DB2 concept, procedure, and tool you'll need to get results as an administrator, user, or developer. You'll find authoritative coverage of installation, configuration, objects, database instances, storage, connectivity, security, performance, backup and recovery, SQL fundamentals, and much more. Virtually every new concept is explained with screenshots, diagrams, or tables, all designed to help you learn faster and remember more. Understanding DB2 For those preparing for certification, this book also contains over a hundred sample questions crafted by the authors to reflect the content and format of the IBM DB2 UDB Database Administration Certification exams, with answers and detailed explanations. Coverage includes Understanding the DB2 product family, DB2 commands, and the DB2 environment Configuring client and server connectivity: walkthroughs of four typical scenarios Managing DB2 storage: partitions, tablespaces, buffer pools, and more Leveraging the power of SQL: queries, inserts, deletes, and updates Implementing security: encryption, authentication, and authorization Administering and maintaining data, from LOAD and EXPORT to backup/recovery Providing high availability with online split mirroring and suspended I/O DB2 architecture: process and memory models Managing database performance and troubleshooting

OCA: Oracle 10g™ Administration I: Study Guide

Here's the book you need to prepare for the Oracle Database 10g Administration I exam, 1Z0-042. This Study Guide was developed to meet the exacting requirements of today's Oracle certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the "Best Study Guide" selection in CertCities Readers Choice Awards for two consecutive years, this book provides: Clear and concise information on database administration with Oracle 10g Practical examples and insights drawn from the authors' real-world experiences Leading-edge exam preparation software, including a test engine and electronic flashcards You'll also find authoritative coverage of key exam topics, including: Installing Oracle Database 10g Software Creating and Controlling Oracle Databases Administering Users Managing Schema Objects and Data Implementing Oracle Security Features Monitoring Performance Performing Database Backup and Recovery Look to Sybex for the knowledge and skills needed to succeed in today's competitive IT marketplace

Oracle Database Foundations

The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor. Oracle Database Foundations provides essential knowledge about installing, configuring, maintaining, and querying Oracle 9i and 10g databases. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include: Basic relational database concepts Reporting and querying using SQLPlus and iSQLPlus Creating and maintaining a database Managing user access and security Understanding Oracle database functions Using multiple tables in a query Restricting, sorting, and grouping data Optimizing database performance Creating backups Troubleshooting database errors

DB2 UDB V8.2 on the Windows Environment

IBM DB2 Universal Database Version 8.2 is another significant jump in DBRM technology. It delivers new features to address the ever-increasing demands and requirements of information management customers. This IBM Redbooks publication is an update of DB2 UDB Exploitation of the Windows Environment (SG24-6893), with a focus on DB2 UDB Version 8.2 functions and features. We illustrate, step-by-step, the installation and migration processes. The new autonomic computing technology that makes the DBA’s job easier is described in detail. The new security features and their integration with the Windows environment are discussed intensively. This book covers the new performance and monitoring enhancements of Version 8.2. New, exciting high availability functions are described in detail. Further, we discuss aspects of DB2 application development with .NET 2003 and Java and provide programming details using ADO.NET, CLR, and Java.

Using ThinkVantage Technologies, Volume 1: Creating and Deploying Client Systems

ThinkVantage Technologies bring your IBM PCs one step closer to being self-configured, self-optimizing, self-protecting, or self-healing, to help save you time and money throughout the life of your systems. In short, ThinkVantage Technologies let you focus your attention on your business, rather than on your computer. ThinkVantage Technologies are software tools designed to help customers drive down IT support costs (in particular, the cost of a PC in managing and supporting systems after its initial purchase), increase security and decrease the complexity of today’s IT infrastructure. This series of Redbooks will help you install, tailor and configure the IBM ThinkVantage Technologies on IBM and OEM desktops. Using ThinkVantage Technologies, Volume 1: Creating and Deploying Client Systems describes how to create and deploy client systems. The tools covered include: - ImageUltra Builder

Oracle Database 10g The Complete Reference

Get a thorough understanding of Oracle Database 10 g from the most comprehensive Oracle database reference on the market, published by Oracle Press. From critical architecture concepts to advanced object-oriented concepts, this powerhouse contains nearly 50 chapters designed to enlighten you. Upgrade from earlier versions, use SQL, SQL Plus, and PL/SQL. Get code examples and access popular documentation PDFs--plus a full electronic copy of the book on the included CD-ROM. Go beyond the basics and learn security, text searches, external tables, using Java in Oracle, and a great deal more.

Oracle SQL

Developers and DBAs use Oracle SQL coding on a daily basis, whether for application development, finding problems, fine-tuning solutions to those problems, or other critical DBA tasks. Oracle SQL: Jumpstart with Examples is the fastest way to get started and to quickly locate answers to common (and uncommon) questions. It includes all the basic queries: filtering, sorting, operators, conditionals, pseudocolumns, single row functions, joins, grouping and summarizing, grouping functions, subqueries, composite queries, hierarchies, flashback queries, parallel queries, expressions and regular expressions, DML, datatypes (including collections), XML in Oracle, DDL for basic database objects such as tales, views and indexes, Oracle Partitioning, security, and finally PL/SQL. * Each of the hundreds of SQL code examples was tested on a working Oracle 10g database * Invaluable everyday tool that provides an absolute plethora of properly tested examples of Oracle SQL code * Authors have four decades of commercial experience between them as developers and database administrators

Privacy What Developers and IT Professionals Should Know

Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." —Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." —Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." —Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." —Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." —Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." —Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." —Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-enhancing and potentially privacy-invading technologies, J.C.'s analysis is thorough and well-balanced. J.C. also explains many of the legal implications of electronic privacy policies and technologies, providing an invaluable domestic and international view." —Steve Riley, Product Manager, Security Business and Technology Unit, Windows Division, Microsoft "Privacy concerns are pervasive in today's high-tech existence. The issues covered by this book should be among the foremost concerns of developers and technology management alike." —Len Sassaman, Security Architect, Anonymizer, Inc. You're responsible for your customers' private information. If you betray their trust, it can destroy your business. Privacy policies are no longer enough. You must make sure your systems truly protect privacy—and it isn't easy. That's where this book comes in. J.C. Cannon, Microsoft's top privacy technology strategist, covers every facet of protecting customer privacy, both technical and organizational. You'll learn how to systematically build privacy safeguards into any application, Web site, or enterprise system, in any environment, on any platform. You'll discover the best practices for building business infrastructure and processes that protect customer privacy. You'll even learn how to help your customers work with you in protecting their own privacy. Coverage includes How privacy and security relate—and why security isn't enough Understanding your legal obligations to protect privacy Contemporary privacy policies, privacy-invasive technologies, and privacy-enhancing solutions Auditing existing systems to identify privacy problem areas Protecting your organization against privacy intrusions Integrating privacy throughout the development process Developing privacy-aware applications: a complete sample application Building a team to promote customer privacy: staffing, training, evangelization, and quick-response Protecting data and databases via role-based access control Using Digital Rights Management to restrict customer information Privacy from the customer's standpoint: spam avoidance, P3P, and other tools and resources Whether you're a manager, IT professional, developer, or security specialist, this book delivers all the information you need to protect your customers—and your organization. The accompanying CD-ROM provides sample privacy-enabling source code and additional privacy resources for developers and managers. J. C. CANNON, privacy strategist at Microsoft's Corporate Privacy Group, specializes in implementing application technologies that maximize consumer control over privacy and enable developers to create privacy-aware applications. He works closely with Microsoft product groups and external developers to help them build privacy into applications. He also contributed the chapter on privacy to Michael Howard's Writing Secure Code (Microsoft Press 2003). Cannon has spent nearly twenty-five years in software development. © Copyright Pearson Education. All rights reserved.

Effective Oracle Database 10g Security by Design

Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. “In my experience in the security world, including 32 years at the Central Intelligence Agency, I’ve not found anyone with more experience in the theory and practice of protecting your data than David Knox.” --Dave Carey, former Executive Director of the CIA

Designing Web Services with the J2EE™ 1.4 Platform JAX-RPC, SOAP, and XML Technologies

Written by Sun Microsystems' Java™ BluePrints team, is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. Designing Web Services with the J2EE™ 1.4 Platform The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform. Designing Web Services with the J2EE™ 1.4 Platform

Microsoft® SQL Server™ 2005 Reporting Services Step by Step

Your hands-on guide to learning Microsoft SQL Server Reporting Services, Microsoft’s customizable reporting solution for business data analysis. Reporting Services is a powerful tool for business intelligence, so an understanding of the essentials—how to architect a report, as well as how to install and program Reporting Services—is key to harnessing the full benefits of SQL Server. This step-by-step tutorial shows you how to get started, how to use the report project wizard, how to think about and access data, and how to build queries. It also walks you through the creation of charts and visual layouts to enable maximum visual understanding of the data analysis. Interactivity features (enhanced in SQL Server 2005) and security are also covered in detail. With STEP BY STEP, you work at your own pace through hands-on, learn-by-doing exercises. Whether you’re a beginning programmer or new to this version of the technology, you’ll understand the fundamental techniques for using Reporting Services. A companion CD includes data sets and sample code.

DB2 for Linux on iSeries: Implementation Guide

This IBM Redbooks publication discusses DB2 UDB for Linux on iSeries. We provide the installation and configuration steps for DB2 UDB for Linux on iSeries. We also present connectivity scenarios between OS/400 resources and Linux resources. With V8.1, DB2 UDB for Linux is available for running in a Linux partition on an IBM eServer iSeries system. Linux is one of the fastest growing operating systems in the industry today. Linux is quickly becoming a key enabler for e-business applications that are demanding more robust local database capabilities. Applications running in the Linux partition can certainly leverage DB2 UDB for iSeries through a variety of interfaces (DB2 Connect, JDBC, ODBC), and this is an excellent choice to leverage the low administration overhead, autonomic computing, and security benefits provided by DB2’s tight integration with OS/400. DB2 for Linux is an excellent choice to support Linux (or other client/server) applications when there is a need to have local data storage within the Linux application environment or to leverage specific features of DB2 UDB V8 such as Federated Database or Microsoft .NET Framework support.

High Performance MySQL

As users come to depend on MySQL, they find that they have to deal with issues of reliability, scalability, and performance--issues that are not well documented but are critical to a smoothly functioning site. This book is an insider's guide to these little understood topics.Author Jeremy Zawodny has managed large numbers of MySQL servers for mission-critical work at Yahoo!, maintained years of contacts with the MySQL AB team, and presents regularly at conferences. Jeremy and Derek have spent months experimenting, interviewing major users of MySQL, talking to MySQL AB, benchmarking, and writing some of their own tools in order to produce the information in this book.In High Performance MySQL you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life environments. And you'll learn the supporting techniques you need to carry out these tasks, including advanced configuration, benchmarking, and investigating logs.Topics include: A review of configuration and setup options Storage engines and table types Benchmarking Indexes Query Optimization Application Design Server Performance Replication Load-balancing Backup and Recovery Security

Oracle Essentials, 3rd Edition

An enormous system comprising myriad technologies, options, and releases, Oracle's complexities have spawned numerous areas of specialization. For each area of specialization there are equally specialized how-to books and manuals. O'Reilly's Oracle Essentials claims a unique place among these books. Rather than focusing on one area, the book explains the foundational concepts of the Oracle technology and the core technical and business aspects of using it.The new edition of this classic book, Oracle Essentials, 3rd Edition: Oracle Database 10g, distills a vast amount of knowledge into an easy-to-read volume covering every aspect of the Oracle database. Readers of all levels will learn about Oracle's features and technologies, including the product line, architecture, data structures, networking, concurrency, tuning, and much more.Featuring focused text, abundant illustrations, and helpful hints, the new edition offers a valuable overview of Oracle's Database 10 g--the industry's first database to support grid computing. Recent releases such as Oracle 9 i and 8 i are also covered. The book contains chapters on: Oracle products, options, and overall architecture for Oracle 10 g and prior recent releases Installing and running Oracle: how to configure, start up, and shut down the database, and various networking issues Oracle data structures, datatypes, and ways of extending datatypes, with an introduction to Oracle objects (e.g., tables, views, indexes) Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle performance: characteristics of disk, memory, and CPU tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Network deployment: using Oracle as an Internet computing platform and for grid computing What's new in Oracle 10 g: a summary of the database changes described in the book Oracle Essentials, 3rd Edition: Oracle Database 10g was written for anyone whose job involves managing or building systems using Oracle DBMS technology or working with staff that uses Oracle technology. This book is the perfect all-in-one source for understanding the complexities and capabilities of Oracle.

IBM Tape Solutions for Storage Area Networks and FICON

The explosive growth of stored data, the increasing value of the data, and the fact that it is often distributed over multiple heterogeneous servers has created significant problems for backing up and archiving data. Also, the increased pressure for more productive IT time and less time for administrative tasks means that there is more data to backup in less time. This IBM Redbooks publication explains how tape drives and tape libraries can use storage area networks (SANs) to solve these problems. It explains how you can exploit SANs to attach, share, and exploit IBM tape subsystems and tape libraries. The ability to share tape libraries across many hosts creates a tremendous financial advantage that can be an immediate benefit of implementing SANs in your enterprise. You can often achieve significant cost savings and increase data security by implementing the tape sharing and extended distance capabilities of SAN. This book also includes a practical description of the products and components that were made available with the IBM SAN product rollout. For a definitive guide to SANs and their implementation, refer to the book Designing an IBM Storage Area Network, SG24-5758. Although the primary focus in this book is on SAN tape solutions, you must also understand advances in SAN-attached disk storage, advances in copy functions, and storage management software.

XForms Essentials

The use of forms on the web is so commonplace that most user interactions involve some type of form. XForms--a combination of XML and forms--offers a powerful alternative to HTML-based forms. By providing excellent XML integration, including XML Schema, XForms allows developers to create flexible, web-based user-input forms for a wide variety of platforms, including desktop computers, handhelds, information appliances, and more. XForms Essentials is an introduction and practical guide to the new XForms specification. Written by Micah Dubinko, a member of the W3C XForms working group and an editor of the specification, the book explains the how and why of XForms, showing readers how to take advantage of them without having to write their own code. You'll learn how to integrate XForms with both HTML and XML vocabularies, and how XForms can simplify the connection between client-based user input and server-based processing. XForms Essentials begins with a general introduction to web forms, including information on history and basic construction of forms. The second part of the book serves as a reference manual to the XForms specification. The third section offers additional hints, guidelines, and techniques for working with XForms. Topics covered in the book include: creating XForms files in a text or XML editor converting existing forms (electronic or paper) to XForms collecting XML data from users in a user-friendly way reducing the amount of JavaScript needed within browser interfaces increasing the security and reliability of your current forms system by combining client-side and server-side checks into a common code base creating interactive websites using the latest standard technology XForms Essentials focuses on the practical application of XForms technology. If you work with forms, HTML, or XML information, XForms Essentials will provide you with a much simpler route to more sophisticated interactions with users.

Unattended Pristine Installation with IBM Tivoli Configuration Manager

Pristine installations of operating systems is a strategic method to ensure that the security of your machines is maintained and that no one has left accounts or Trojan horses on your servers waiting to be executed at a later date. For this reason, reasonable methods to complete this task from a central location is necessary to reduce IT costs. Each vendor has produced software and methods for being able to roll out a new operating system in an unattended fashion. This IBM Redbooks publication ties each of those solutions into a centralized overall solution using IBM Tivoli Configuration Manager Version 4.2. It is important to understand that all the features and enhancements tie together to enable the environment more flexibility, efficiency, and faster deployment, helping to cut costs and time. Pristine installation of software is the first important step of managing your networked computers. IBM Tivoli Configuration Manager Version 4.2 provides an "attended" pristine installation using the Pristine tool. This book explores integrating IBM Tivoli Configuration Manager with tools that provide unattended pristine installations.

Implementing CIFS: The Common Internet File System

"The book that Microsoft should have written, but didn't." —Jeremy Allison, Samba Team "Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read." —J.D. Lindemann, network engineer, Adaptec, Inc. The first developer's guide to Microsoft®'s Internet/Intranet file sharing standard For years, developers and administrators have struggled to understand CIFS, Microsoft's poorly documented standard for Internet file sharing. Finally, there is an authoritative, cross-platform guide to CIFS capabilities and behavior. Implementing CIFS not only delivers the priceless knowledge of a Samba Team member dedicated to investigating the inner workings of CIFS, it also identifies and describes crucial specifications and supporting documents. Provides essential information for designing and debugging large Windows® and/or Samba networks Offers clear, in-depth introductions to Server Message Block (SMB), NetBIOS over TCP/IP (NBT), browser services, and authentication Drills down into the internals of CIFS, exposing its behavior on the wire and at the desktop—and its strange quirks Presents illustrative code examples throughout Reflects years of work reviewing obscure documentation, packet traces, and sourcecode Includes the SNIA CIFS Technical Reference Implementing CIFS will be indispensable to every developer who wants to provide CIFS compatibility—and every administrator or security specialist who needs an in-depth understanding of how it really works.