Definitions Database Security KeyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Definitions Database Security Key returned the following results.
RSS What is RSS?
Related Categories

 •   Data Center Management
 •   Business Planning
 •   Data Security
 •   Storage Management
 •   Data Warehousing
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Data Quality
 •   Databases
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Definitions Database Security Financial
 •   Definitions Database Sql
 •   Definitions Speed
 •   Designs Definitions Database
 •   Guides Definitions Database
 •   India Definitions Database
 •   Network Definitions
 •   Operating Definitions Database Security
 •   Papers Definitions
 •   Requirement Definitions
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 31, 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 09, 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Public, Private and Hybrid Cloud Storage: Expert Definitions and Configuration Steps by Oracle Corporation

November 28, 2012 - (Free Research)
This expert E-Guide is a great intro to cloud storage. Learn four key definitions of private cloud storage, five advantages of cloud storage and a Q&A with a Gartner research VP on hybrid cloud storage. 
(EGUIDE) READ ABSTRACT |

Backup Appliances: Key Players and Criteria for Selection by SearchStorage.com

June 21, 2013 - (Free Research)
This E-Guide provides an up-to-date definition of today's backup appliances and points out the pros and cons of using them. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Inside The Cloud, Key Security Factors When Considering Managed Services by AT&T Corp

December 14, 2009 - (Free Research)
This Presentation Transcript offers an overview of the cloud computing landscape as it relates to information security. Few organizations realize the vast and inherent risks that cloud computing presents, including data exposure, data loss, and a compromised infrastructure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations by Websense, Inc.

September 15, 2011 - (Free Research)
Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them. 
(WHITE PAPER) READ ABSTRACT |

BI: The Inconvenient Truth by Kalido

June 2008 - (Free Research)
What’s the truth behind the failure of many BI projects? Read this paper to learn the main factors leading to disappointment. These pitfalls are not those of new entrants to BI but have been repeated by smart and well managed companies worldwide. 
(WHITE PAPER) READ ABSTRACT |

Fast Tracking Data Warehousing & BI Projects Via Intelligent Data Modeling by Embarcadero Technologies, Inc.

September 2010 - (Free Research)
In this webcast, you’ll learn from BI and enterprise modeling expert, Claudia Imhoff how intelligent data modeling practices to design and deliver superior BI faster, the characteristics and benefits of intelligent data modeling, How to promote the use of data models to fast-track data warehouse and BI projects, and more. 
(WEBCAST) READ ABSTRACT |

Using the Eclipse Data Tools Platform with SQL Anywhere 10 by Sybase iAnywhere

March 2008 - (Free Research)
The Eclipse Data Tools Platform (DTP) project is a new top-level project at eclipse.org. 
(WEBCAST) READ ABSTRACT |

Security in the Cloud Planning Guide by Intel

May 2012 - (Free Research)
You need to take several key security elements into account when planning your cloud initiative. This guide offers practical guidance for incorporating security into your cloud project and offers a checklist to help you choose the right cloud provider for your organization. 
(WHITE PAPER) READ ABSTRACT |

Business Continuity Planning IT Survival Guide by CA Technologies.

December 2008 - (Free Research)
This survival guide will help you and your company start to plan an effective business continuity plan. The end result should be a reduction in risk factors and to minimize the impact of disasters that are out of your control. 
(WHITE PAPER) READ ABSTRACT |

eBook: Evaluating CRM: From SaaS to software, choosing the right CRM deployment style by Aplicor

March 2009 - (Free Research)
In this eBook, find out how on-demand and SaaS CRM is altering the CRM software landscape. Learn how both on-demand and on-premise CRM have evolved in recent years and how industry trends are playing into the decision-making process at many organizations. 
(EBOOK) READ ABSTRACT |

Security visualisation by ComputerWeekly.com

January 2013 - (Free Research)
This article in our Royal Holloway Information Security Thesis series shows how to generate a visual representation of a dataset and use visualisation in the evaluation of known security vulnerabilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

9 key cloud storage criteria E-Guide HP 3PAR by SearchStorage.com

March 2012 - (Free Research)
This expert E-Guide lays out the 9 key cloud storage criteria -- the essential elements that define a true cloud storage offering. 
(EGUIDE) READ ABSTRACT |

How to tackle risk taxonomy by ComputerWeekly.com

November 2010 - (Free Research)
This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available. 
(WHITE PAPER) READ ABSTRACT |

Data stewardship program: Quality booster, but a hard step for many by SAP America, Inc.

December 2012 - (Free Research)
Data stewards are central to the success of data governance programs. Without data stewards to facilitate the communications about data issues between IT and the business side, diverging data definitions, policies and quality controls can easily get out of control. This e-guide offers tips and best practices. 
(EGUIDE) READ ABSTRACT |

Emergency Management Plans Made Easy & Practical by VMware, Inc.

January 2013 - (Free Research)
Your DR plan covers immediate incident response, but does it address long-term post-crisis support? Learn about the key phases of an effective emergency management program - from prevention to resolution - by reading this exclusive SearchSMBStorage.com E-Guide. 
(EGUIDE) READ ABSTRACT |

E-Guide: Identifying and addressing evolving threats by SearchSecurity.com

February 2012 - (Free Research)
This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Building a Cloud-Ready File Storage Infrastructure by F5 Networks

August 2011 - (Free Research)
Read this transcript of a recent webcast to discover how to create the operational flexibility you need to seamlessly integrate the cloud into your environment and at the same time immediately address many of your current storage challenges. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Building a Cloud-Ready File Storage Infrastructure by F5 Networks

August 2011 - (Free Research)
View this webcast to discover how to create the operational flexibility you need to seamlessly integrate the cloud into your environment and at the same time immediately address many of your current storage challenges. 
(WEBCAST) READ ABSTRACT |

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection by American Megatrends Inc.

April 2008 - (Free Research)
Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ... 
(WHITE PAPER) READ ABSTRACT |

Largest UK Network Solves BIG Problem with Small Solution by Nexsan

November 2009 - (Free Research)
ITV.com’s IT management sought a future-proofed solution that would improve overall performance and future proof for High Definition editing without increasing the physical storage footprint requirements of their small datacenter. Nexsan was the only company that could deliver the solution they required. 
(CASE STUDY) READ ABSTRACT |

Optimizing Exchange High Availability - A New Approach by Marathon Technologies

September 2009 - (Free Research)
Businesses of all sizes are using the messaging and collaboration features of Microsoft Exchange to run critical business functions that if lost, can result in severe business disruption. Exchange and Exchange infrastructure components are analyzed in this paper to determine how they can be protected so you can achieve your SLA commitments. 
(WHITE PAPER) READ ABSTRACT |

The Evolution of the ‘Big Data’ Concept by HP & Intel®

January 2013 - (Free Research)
Access this exclusive guide to analyze the evolution of the big data concept. Examine how many analysts are coming to believe that the 3-V definition falls short. Continue on to delve further into the big data discussion and discover how Gartner, who originally introduced the 3-V concept, has begun to build on this rudimentary interpretation. 
(EGUIDE) READ ABSTRACT |

Spam, Spammers, and Spam Control by Trend Micro GmbH

March 2009 - (Free Research)
This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts