IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security Reports
1 - 25 of 221 Matches Previous Page  |  Next Page
Why Big Data Demands More Out of Databases
sponsored by IBM
EGUIDE: To build or to buy? That is the cloud database question. In this e-guide, explore use cases and trends to help you decide which decision better meets your organization's needs.
Posted: 14 May 2015 | Published: 14 May 2015

IBM

Backing Up an MS SQL Server 2008 Database
sponsored by Rackspace
RESOURCE: This article will walk you through the process of backing up an MS SQL Server 2008 Database.
Posted: 12 May 2015 | Published: 13 Aug 2012

Rackspace

SQL Injection in MySQL
sponsored by Rackspace
RESOURCE: This article is intended to discuss some of the ways that MySQL databases can be exposed via SQL Injection techniques.
Posted: 11 May 2015 | Published: 11 Jun 2014

Rackspace

Create a maintenance backup plan in SQL Server 2008 R2 using the wizard
sponsored by Rackspace
RESOURCE: In this walk-through you can learn how to set up a maintenance plan with full backups, differentials and transaction logs. Set up your maintenance backup plan in SQL server 2008 R2 in 8 easy steps.
Posted: 11 May 2015 | Published: 10 Apr 2014

Rackspace

The Real World of the Database Administrator
sponsored by Dell Software
WHITE PAPER: Discover the ways in which database administrators (DBAs) are seeking to get more valuable information out of their relational databases. Learn the top challenges facing DBAs.
Posted: 11 May 2015 | Published: 31 Mar 2015

Dell Software

CW Europe – May 2015
sponsored by ComputerWeekly.com
EZINE: In this issue, CW Europe's security editor investigates whether the legislation could strangle Europe's productivity and whether businesses see the regulations as a burden.
Posted: 07 May 2015 | Published: 07 May 2015

ComputerWeekly.com

Five Ways Rackspace is Making Adopting MSSQL 2014 and In-Memory Effortless
sponsored by Rackspace
RESOURCE: Your organization can learn how to adopt Microsoft SQL server 2014 in 5 easy steps with this concise article. Discover how you can get the ease and capability of in-memory functionality with added security and high availability now.
Posted: 07 May 2015 | Published: 27 Jan 2015

Rackspace

Document Storage: 7 Must-Have Features for Superior Performance
sponsored by Actuate
WHITE PAPER: Organizations that produce high-volume customer communications must employ electronic archives to securely store content. This white paper lays out performance-enhancing features found in state-of-the-art enterprise document storage systems. Discover performance-enhancing features all archives should possess.
Posted: 01 May 2015 | Published: 01 May 2015

Actuate

Next Generation Security for Virtualized Datacenters
sponsored by BitDefender
WHITE PAPER: In this white paper, discover what a virtual environment needs in order to maintain its security.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

Oracle MAA Reference Architectures
sponsored by Oracle Corporation
WHITE PAPER: View this informative white paper for a detailed discussion of four high availability reference architecture and the accompanying service level objectives that can be achieved.
Posted: 27 Apr 2015 | Published: 01 Jul 2014

Oracle Corporation

Lab Report: SIOS DataKeeper Replication for Windows Clusters
sponsored by SIOS Technology Corp
RESOURCE: Access this extensive study to learn just how effective DataKeeper is in an SQL Server 2012 environment. Discover how this software performed when cluster nodes failed. Read now to delve deeper into DataKeeper's implementation, and set up process to determine if it could help your organization with their data replication needs.
Posted: 20 Apr 2015 | Published: 31 Dec 2014

SIOS Technology Corp

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
RESOURCE: Access this popular resource to find out how you can protect transactions at the point of sale.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Bit9 + Carbon Black

Internet System for Tracking Over-Prescribing (I-Stop) FAQ
sponsored by Imprivata
WHITE PAPER: Access this white paper to find out about frequently asked questions regarding software that tracks over-prescribing. Read on to learn more about the laws and regulations, software and data requirements, and more.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

How ObjectRocket Gives Free Backups to Everyone
sponsored by Rackspace
WHITE PAPER: When anyone in the community loses data, everyone in the community feels the effects. Fortunately, for MongoDB users, free backup that's not an add-on or an upcharge is possible to achieve. Learn how it's possible to back up data at a secure location completely free of charge as you read this resource.
Posted: 19 Sep 2014 | Published: 11 Aug 2014

Rackspace

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013

Asigra

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Computer Weekly – 9 December 2014: The most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ComputerWeekly.com

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com
1 - 25 of 221 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement