IT Management  >   Systems Operations  >   Security  >  

Database Administration Security

RSS Feed    Add to Google    Add to My Yahoo!
Database Administration Security Reports
 
Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Internet System for Tracking Over-Prescribing (I-Stop) FAQ
sponsored by Imprivata
WHITE PAPER: Access this white paper to find out about frequently asked questions regarding software that tracks over-prescribing. Read on to learn more about the laws and regulations, software and data requirements, and more.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

Windows Azure Storage: A Highly Available Cloud Storage Service with Strong Consistency
sponsored by Microsoft
WHITE PAPER: Read this white paper to learn about the architecture, data model, resource provisioning, load balancing, and replication systems of Windows Azure Storage (WAS), a scalable cloud storage system that provides customers with seemingly limitless data storage, access from anywhere at any time, and the ability to only pay for what they use.
Posted: 25 Apr 2012 | Published: 31 Dec 2011

Microsoft

Controlling Risk Through Software Code Governance
sponsored by Coverity by Synopsys
WHITE PAPER: Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

Coverity by Synopsys

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation

Taking the fear out of bringing Government Systems online
sponsored by IBM
WHITE PAPER: People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems.
Posted: 27 Dec 2012 | Published: 24 Jul 2012

IBM

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS)
sponsored by IBM
WHITE PAPER: This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

IBM

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

Introducing the Next Generation of SPARC Servers E-Book
sponsored by Oracle Corporation
EBOOK: Discover the benefits of Oracle's new SPARC T4 servers and how they deliver world record performance for a wide range of enterprise applications, and offer enhanced reliability and security, improved virtualization tools, and reduced costs. View this e-book packed with valuable information, customer success stories, and a 3D demo.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

Oracle Corporation

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement