Implementing Database Security And Auditing

Security and Auditing of Smart Devices  eBooks & eLearning

Posted by AlenMiler at Nov. 23, 2016
Security and Auditing of Smart Devices

Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices (Internal Audit and IT Audit) by Sajay Rai
English | 13 Dec. 2016 | ISBN: 1498738834 | 220 Pages | PDF | 14.25 MB

Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance.

Security and Privacy for Mobile Healthcare Networks (Repost)  eBooks & eLearning

Posted by insetes at Dec. 5, 2016
Security and Privacy for Mobile Healthcare Networks (Repost)

Security and Privacy for Mobile Healthcare Networks By Kuan Zhang, Xuemin (Sherman) Shen
2015 | 134 Pages | ISBN: 3319247158 | PDF | 3 MB
Handling Input and Storage on Android: Implementing Input Controls and Data Storage on Android

Handling Input and Storage on Android: Implementing Input Controls and Data Storage on Android by Peter Leow
English | 23 Aug. 2016 | ASIN: B01KXZA9GG | 57 Pages | AZW3/MOBI/EPUB/PDF (conv) | 2.35 MB

Learn to write an Android app to handle different input controls and to store data on the various Android storage types including shared preferences, internal storage, external storage, and SQLite database.

Auditing IIS Web Servers for Security and Best Practices (2016)  eBooks & eLearning

Posted by naag at Sept. 23, 2016
Auditing IIS Web Servers for Security and Best Practices (2016)

Auditing IIS Web Servers for Security and Best Practices
September 2016 | MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours 40M | 247 MB
Genre: eLearning | Language: English

Cyber-attacks are on the rise. Microsoft IIS is used to serve web sites around the world. This course will teach you how to audit your server's security and mitigate common insecure configurations as well as reduce your attack surface.

Auditing AWS Environments for Security and Best Practices  eBooks & eLearning

Posted by naag at June 28, 2016
Auditing AWS Environments for Security and Best Practices

Auditing AWS Environments for Security and Best Practices
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 216 MB
Genre: eLearning | Language: English

AWS is the most popular cloud hosting infrastructure in the world. This course will cover security and best practices for the most commonly used services, including IAM, VPC, EC2, EBS, and S3.

VoIP and PBX Security and Forensics: A Practical Approach  eBooks & eLearning

Posted by Underaglassmoon at May 4, 2016
VoIP and PBX Security and Forensics: A Practical Approach

VoIP and PBX Security and Forensics: A Practical Approach, Second Edition
Springer | Signals & Communication | May 27, 2016 | ISBN-10: 3319297201 | 103 pages | pdf | 4.99 mb

Authors: Androulidakis, Iosif I.
Covers software/management access, database access, and functionality access for PBX systems
Presents best security practices and protection methods
Includes a major update to the VoIP and forensics material

.NET Security and Cryptography by G. Gnana Arun Ganesh  

Posted by tanas.olesya at Sept. 6, 2015
.NET Security and Cryptography by G. Gnana Arun Ganesh

.NET Security and Cryptography (The Integrated .NET Series from Object Innovations) by G. Gnana Arun Ganesh
English | 18 Aug. 2003 | ISBN: 013100851X | 496 Pages | CHM | 3 MB

Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform ― using the C# and VB .NET programming languages.
Real World Microsoft Access Database Protection and Security [Repost]

Real World Microsoft Access Database Protection and Security by Garry Robinson
English | Sep 24, 2013 | ISBN: 1430254041, 1590591267 | 494 Pages | CHM | 11.58 MB

Security issues for all versions of Access from 97 to 2003 are discussed and the merits of each security approach from both the perspective of the developer and the database administrator/manager are examined.
Visual Developer SQL Database Programming with Java (repost)

Visual Developer SQL Database Programming with Java: Creating Fast, Efficient Database Applications for the Web by Bill McCarty
English | Sep 3, 1997 | ISBN: 1576101762 | 512 Pages | DJVU | 5 MB

Provides practical instruction in creating database applications with Java, SQL, and JDBC. Shows how to design and build Internet-capable client/server systems. Includes thorough coverage of SQL, with key points illustrated by helpful diagrams. Explains how to use Java and SQL with popular database management systems, such as Microsoft Access. Demonstrates how to handle tricky issues such as views, multiuser access, database security, and database integrity. Teaches how to use Java's JDBC classes and the JDBC-ODBC bridge.

Auditing Cloud Computing: A Security and Privacy Guide  

Posted by tukotikko at April 5, 2013
Auditing Cloud Computing: A Security and Privacy Guide

Auditing Cloud Computing: A Security and Privacy Guide By Ben Halpert
2011 | 206 Pages | ISBN: 0470874740 | PDF | 1 MB