Bank Database Security E-CommerceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Bank Database Security E-Commerce returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Integrated E-Commerce Solutions
 •   Customer Information Management/ Customer Databases
 •   Databases
 •   Customer Relationship Management (CRM)
 •   Customer Interaction Management
 •   Business to Consumer Web Commerce
 •   Web Content Management and Publishing
 •   Business Intelligence Solutions
 •   Database Administration

Related Searches
 •   Bank Database Louisiana
 •   Bank Database Requirement
 •   Bank Database Security Graphs
 •   Bank Database Security Internet
 •   Bank Notes
 •   Demo Bank Database Security
 •   Network Bank
 •   Problems Bank Database
 •   Trend Bank
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Oracle Database 11g Application Development by Oracle Corporation

June 2007 - (Free Research)
Application development organizations have a wide variety of programming languages and technologies to choose from. In this white paper learn how Oracle Database 11g delivers a highly productive and powerful set of application development tools. 
(WHITE PAPER) READ ABSTRACT |

Data Breach Case Study: Heartland Payment Systems by Sourcefire

January 2009 - (Free Research)
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals. 
(CASE STUDY) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match by Informatica

December 2008 - (Free Research)
This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems. 
(BOOK) READ ABSTRACT |

SSL: The Backbone of Doing Business over the Internet by VeriSign, Inc

October 2008 - (Free Research)
Read this white paper to learn about technology in place today that helps online businesses protect sensitive customer data, authenticate themselves, and build consumer trust. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: MS SQL Server 2008 by Fusion-IO

September 2009 - (Free Research)
Check out this transcript of a presentation given by Sumeet Bansal, Fusion-io Principal Solutions Architect, to learn how Fusion-io solutions enhance SQL server performance, improve customer experience, and optimize storage management systems. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

All-in-One Internet Filtering Solution Solves Costly Problems for Easton Bell Sports by Bloxx, Inc.

September 2008 - (Free Research)
Easton-Bell Sports was growing increasingly concerned about its bandwidth consumption, as well as the time IT staff members were spending removing malware from employees' computers. 
(CASE STUDY) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Staples Case Study by IBM

September 2011 - (Free Research)
Staples set the bar for the office superstore when it first opened its doors in 1986. It now has the second-largest Internet retail revenue in the world with $10.2 billion in 2010 sales, 43% of the company's total revenue. This paper details how Staples delivered a much more personalized shopping experience to its online customers. 
(CASE STUDY) READ ABSTRACT |

Exalogic & Exadata: The Optimal Platform for ATG by Oracle Corporation

January 2012 - (Free Research)
Download this white paper to learn about the market-leading e-Commerce solution and how improved performance can lead to increased conversion rates and higher revenue. 
(WHITE PAPER) READ ABSTRACT |

The Web Hacking Incidents Database 2009 Bi-Annual Report by Breach Security

August 2009 - (Free Research)
Criminals focus on exploiting web application vulnerabilities in order to plant malware and thus infect clients who visit websites. Read this report to learn more about the drivers behind web hacking, the vulnerabilities hackers exploit, and the types of organizations attacked most often. 
(WHITE PAPER) READ ABSTRACT |

Optimize Customer Experience to Achieve Competitive Advantage by Wipro Technologies

October 2009 - (Free Research)
Outsourcing Center and Wipro performed a survey that aimed to gauge how banking institutions are doing with their customer experience initiatives. While not a complete picture of how these financial institutions are progressing with their customer experience efforts, survey results point to some general trends and beliefs in this important area. 
(WHITE PAPER) READ ABSTRACT |

Minimize the Impact of Payment Card Industry (PCI) Standard on SAP Applications by Paymetric, Inc.

January 2008 - (Free Research)
Explore encryption management for credit card data to ensure performance and availability of SAP applications. Learn implementation requirements, hurdles to development, and how you can improve security of sensitive customer information. 
(WHITE PAPER) READ ABSTRACT |

TransPromo Opportunities in a Digital World: Electronic Adaptations in an Era of Mobile Communications and Distracted Customers by Pitney Bowes Group 1 Software

September 2008 - (Free Research)
This whitepaper traces the evolution of E-Transpromo, demonstrating the increasingly important role across new media. It explores self-service web portals, online banking and bill consolidators, cell phone bill pay, and secure transaction email. 
(WHITE PAPER) READ ABSTRACT |

CW Special Report on IBM by ComputerWeekly.com

April 2012 - (Free Research)
This special nine-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers. 
(IT BRIEFING) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

Meeting the Payment Card Industry Data Security Standard by Prism Microsystems Inc.

June 2008 - (Free Research)
Unlike many of the other compliance standards in use today PCI/DSS is explicit in its requirements and this paper identifies the specific requirements affecting network administrators and presents the EventTracker solution for these issues. 
(WHITE PAPER) READ ABSTRACT |

Toad for Data Analysis - Query, Understand & Report on Data From Any Source by Dell Software

Toad for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports. 
(ASP & SOFTWARE PRODUCT)

5 Mistakes Auditing Virtual Environments (You Don't Want to Make) by HyTrust

July 2011 - (Free Research)
Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

Computer Weekly 15 November 2011: Read this week's issue of the UK's leading technology publication, with all the latest news, analysis and opinion for IT managers by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we hear from Visa Europe CIO Steve Chambers on the technology behind the credit card transactions that retailers rely on. We examine the challenges facing the government's G-Cloud project; and we ask how Microsoft will cope when customers no longer want to purchase software licences. Download the new issue now. 
(EZINE)

Banca Intesa Counters Threats with HP ArcSight by Hewlett-Packard Company

March 2013 - (Free Research)
Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure. 
(CASE STUDY) READ ABSTRACT |

Real World Intrusion Prevention (IPS) by TippingPoint

November 2008 - (Free Research)
This white paper addresses three primary areas that organizations must consider when formulating network security strategies and evaluating possible solution for intrusion prevention. 
(WHITE PAPER) READ ABSTRACT |

Sun Business Intelligence Solution for Web Infrastructure by Sun Microsystems, Inc.

October 2009 - (Free Research)
The combination of Sun Open Storage and the commercial open-source Infobright data warehousing and Pentaho business intelligence and ETL software packages dramatically lowers the cost of entry and simplifies deployment of a powerful, sophisticated BI infrastructure. 
(PRODUCT OVERVIEW) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts