Guides Database SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Guides Database Security returned the following results.
RSS What is RSS?
Related Categories

 •   Database Administration
 •   Databases
 •   Data Security
 •   Database Planning and Implementation
 •   Security Monitoring
 •   Database Tuning
 •   Application Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Automated Security Auditing/ Source Code Analysis

Related Searches
 •   Access Guides
 •   Conference Guides
 •   Guides Database Contact
 •   Guides Database Finding
 •   Guides Database Firm
 •   Guides Database Security Own
 •   Guides Database Security Provider
 •   Guides Paper
 •   Mac Guides Database
 •   Need Guides Database Security
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

E-Guide: Database Tools for Auditing and Forensics by IBM

March 22, 2011 - (Free Research)
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance. 
(EGUIDE) READ ABSTRACT |

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools by IBM

August 25, 2011 - (Free Research)
Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools. 
(EGUIDE) READ ABSTRACT |

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options by IBM

May 20, 2011 - (Free Research)
Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization. 
(EGUIDE) READ ABSTRACT |

SearchSecurity.com E-Guide: Database monitoring best practices: How to use DAM tools by IBM

August 11, 2011 - (Free Research)
Protecting databases and the data they contain is a challenging task for every IT security professional. This expert e-guide provides best practices for database activity monitoring and explains a step by step process for prioritizing data and protecting transactions. 
(EGUIDE) READ ABSTRACT |

Oracle Compatibility Developers Guide for Postgres Plus Advanced Server by EnterpriseDB Corporation

March 14, 2008 - (Free Research)
This guide describes the Oracle compatibility features of Postgres Plus Advanced Server. Oracle compatibility means that an application runs in an Oracle environment as well as in a Postgres Plus Advanced Server environment with minimal or no changes to the application code. 
(TRAINING GUIDE) READ ABSTRACT |

Tools for Fine-tuning SQL Server Performance by Idera

April 11, 2013 - (Free Research)
In this expert E-Guide, database administrators and business leaders will find key tips for streamlining and improving SQL Server performance. Also inside, learn about three third-party tools that can facilitate SQL Server management. 
(EGUIDE) READ ABSTRACT |

SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know by IBM

August 24, 2011 - (Free Research)
Too many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data. 
(EGUIDE) READ ABSTRACT |

E-Guide: Writing secure SQL database code by IBM

May 26, 2011 - (Free Research)
When developing and deploying a database, organizations should never rely solely on their developers to provide security. This expert e-guide offers tips for writing secure SQL database code to ensure you build appropriate security controls for the specific features and functionality you need. 
(EGUIDE) READ ABSTRACT |

SearchSecurity.com E-Guide: 5 Simple Steps to Secure Database Development by IBM

August 23, 2011 - (Free Research)
Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert e-guide explains the 5 most common database-related vulnerabilities and offers technical advice on how to avoid them. 
(EGUIDE) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Best Practices for Building a Cost-effective Oracle Database on SANs by Dell, Inc.

May 2011 - (Free Research)
This SearchStorage.com E-Guide outlines best practices for building a cost-effective database infrastructure on SANs and how to ensure uptime in these Oracle, SAN environments. Read on to learn what it takes to deploy a scalable, efficient and cost-controlled database infrastructure. 
(EGUIDE) READ ABSTRACT |

SQL Server in the Cloud by SAVVIS

August 2011 - (Free Research)
This SearchSQLServer.com E-Guide explores several options for moving data on SQL Azure migration and synchronization. 
(EGUIDE) READ ABSTRACT |

E-Guide: Newly combined SAP and Sybase could mean big trouble for Oracle by SAP America, Inc.

December 2011 - (Free Research)
In this brief yet informative e-guide, readers will gain expert insight into how SAP will gain the edge over Oracle through its focus on providing a high level of integration between Sybase and SAP that is highly optimized for users to scale their applications effectively. 
(EGUIDE) READ ABSTRACT |

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

Expert Analyst Reviews the Ins and Outs of Database Encryption by Guardium, an IBM Company

February 2010 - (Free Research)
In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project. 
(EGUIDE) READ ABSTRACT |

Essential Guide: Getting started with disaster recovery planning by Riverbed Technology, Inc.

April 2011 - (Free Research)
Whether you're new to IT disaster recovery planning or want to brush up on best practices, we have the answers for you in this essential DR planning guide. 
(EBOOK) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g by Miro Consulting, Inc.

February 2011 - (Free Research)
Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII). 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Expert tips and considerations for database appliances by Delphix

December 2012 - (Free Research)
This e-guide from SearchCIO.com takes a look at one organization's quest to find the right database appliance that suited their needs. Read now for an in-depth analysis of current database appliance offerings, as well as relevant considerations for database security. 
(EGUIDE) READ ABSTRACT |

The Executive Guide to Data Loss Prevention by Websense, Inc.

September 2009 - (Free Research)
Rich Mogull of Securosis answers the question, What is Data Loss Prevention (DLP)? In this videocast he discusses how DLP benefits business and shows examples of DLP usage in the real world. 
(VIDEO) READ ABSTRACT |

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders by Imperva

February 2011 - (Free Research)
Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased. 
(WHITE PAPER) READ ABSTRACT |

Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive by IBM

July 2011 - (Free Research)
This paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action. 
(WHITE PAPER) READ ABSTRACT |

Business Continuity Planning IT Survival Guide by CA Technologies.

December 2008 - (Free Research)
This survival guide will help you and your company start to plan an effective business continuity plan. The end result should be a reduction in risk factors and to minimize the impact of disasters that are out of your control. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts