Database Security Research ArticlesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Database Security Research Articles returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Databases
 •   Database Planning and Implementation
 •   Data Center Management
 •   Virtualization
 •   Database Administration
 •   Application Servers
 •   Data Warehousing
 •   Enterprise Data Protection and Privacy
 •   Storage Management

Related Searches
 •   Access Database
 •   Basic Database Security Research
 •   Database Demonstrations
 •   Database Script
 •   Database Security Format
 •   Database Security Methodology
 •   Database Security Research Content
 •   Database Security Schema
 •   Fact Database Security Research
 •   Files Database
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 31, 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 09, 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Negotiating cloud contracts by ComputerWeekly.com

January 24, 2013 - (Free Research)
This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How To Migrate Your Data In Seven Steps by SAS

March 16, 2009 - (Free Research)
Historically, data migration projects have had a tendency to fail. According to Bloor Research, as many as 60 percent do not succeed. How can you prevent failure when migrating your data? Follow this seven-step process, then download the SAS white paper at the end of this article to learn more. 
(ANALYST REPORT) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 20, 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Gartner: CIO checklist for next-generation mobile strategies by ComputerWeekly.com

July 2012 - (Free Research)
This article by Gartner analysts provides CIOs with a checklist of guidelines and questions to help businesses make the most out of the next generation mobile technology. 
(ANALYST BRIEF) READ ABSTRACT |

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine

May 2010 - (Free Research)
This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more. 
(EZINE)

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

Gartner: How to build an online community by ComputerWeekly.com

February 2014 - (Free Research)
Gartner analyst Julie Hopkins explains seven ways to lure people to participate in online communities and shows how to choose the tactics that will best suit your business needs. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Time to rethink backup procedures by ComputerWeekly.com

February 2014 - (Free Research)
IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell. 
(ANALYST BRIEF) READ ABSTRACT |

Designing Artificial Intelligence for Games (part 2) by Intel Software Network

June 2009 - (Free Research)
This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI. 
(WHITE PAPER)

Gartner: Best practices for I&O for cloud-readiness by ComputerWeekly.com

January 2013 - (Free Research)
Gartner analysts explain how Infrastructure and Operations (I&O) teams can best prepare for the cloud. 
(ANALYST BRIEF) READ ABSTRACT |

Business Information University: Hadoop and NoSQL Integration Strategies by SearchDataManagement

December 2013 - (Free Research)
In this virtual classroom, IT, data warehouse, business intelligence and analytics professionals as well as business executives will find insight and practical advice on integrating Hadoop and NoSQL big data systems into corporate data warehousing environments. 
(VIDEOCAST) READ ABSTRACT |

Gartner: Five trends that will affect your cloud strategy by ComputerWeekly.com

April 2012 - (Free Research)
Businesses need to keep a close eye on the evolution of cloud based services to avoid wasting money and missing out on business opportunities. 
(ANALYST BRIEF) READ ABSTRACT |

Best Practices for Migrating SAP Environments by Sun Microsystems, Inc.

June 2009 - (Free Research)
This Sun BluePrints™ article explains the process of moving an SAP environment from one system to another, and describes the resources and services available from Sun to assist users planning a migration. 
(WHITE PAPER) READ ABSTRACT |

WAN Speak Musings – Volume III by ComputerWeekly.com

November 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

Gartner: What CIOs should know about cloud‑based customer service by ComputerWeekly.com

November 2013 - (Free Research)
IT leaders and managers of customer support need to understand the limits of cloud-based CRM customer service and support software solutions, writes Michael Maoz, vice-president and distinguished analyst at Gartner. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Deploying iPads on the corporate network by ComputerWeekly.com

March 2012 - (Free Research)
Tim Zimmerman, Gartner research director offers some practical advice to organisations wanted to use iPads on their corporate wireless networks. 
(ANALYST BRIEF) READ ABSTRACT |

Article: Best practices for deploying iSCSI SANs in DSS database solutions by Dell, Inc.

April 2011 - (Free Research)
Scalability and availability are key factors of an effective DSS or DW solution. Adhering to the best practices outlined in this article for integrating Dell EqualLogic PS Series iSCSI SAN arrays into the design can help IT administrators create a scalable high-performance infrastructure. 
(ANALYST NEWS) READ ABSTRACT |

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

Gartner: HTML5 and the journey to the modern web by ComputerWeekly.com

July 2012 - (Free Research)
Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later. 
(ANALYST BRIEF) READ ABSTRACT |

Gartner: Context-aware computing by ComputerWeekly.com

June 2012 - (Free Research)
Gartner analysts, William Clark, David W Cearley and Avivah Litan, explain how business can exploit context-aware computing and social media. 
(ANALYST BRIEF) READ ABSTRACT |

WAN Speak Musings – Volume II by ComputerWeekly.com

July 2013 - (Free Research)
Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles. 
(ANALYST REPORT) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts