|
|
|
|
SAS 9.2 Intelligence Platform: Security Administration GuideExplains the security model for the SAS Intelligence Platform and provides instructions for performing security-related administrative tasks. The emphasis is on suite-wide aspects of the security functionality that SAS provides.
New and enhanced features in the following areas increase security and manageability:
... | | Electronic Commerce (Networking Series)The fourth edition of this best-selling title gives a complete overview of the electronic commerce environment. It has been revised and completely updated to reflect the most recent trends in e-commerce, including new material on security technologies, server options, enterprise applications, and investing online. Covering everything from... | | Oracle SecurityThis book covers the field of Oracle security from simple to complex. It describes basic RDBMS security features (e.g., passwords, profiles, roles, privileges, synonyms) and includes many practical strategies for securing an Oracle system, developing auditing and backup plans, and using the Oracle... |
|
PHP Cookbook: Solutions & Examples for PHP Programmers
Want to understand a certain PHP programming technique? Or learn how to accomplish a particular task? This cookbook is the first place to look. With more than 350 code-rich recipes revised for PHP 5.4 and 5.5, this third edition provides updated solutions for generating dynamic web content—everything from using basic data types... | | Effective Oracle Database 10g Security by DesignThe database has two important roles: 1. Serve the data—databases are commonly referred to as data servers; 2. Protect the data. Yes that’s right, the database is there to serve and protect. Database security features are vast and complex. While the complexity can afford us many ways to provide a robust... | | Cisco Access Control Security : AAA Administration ServicesThis book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Hands-on techniques for enabling authentication, authorization, and...
|
|
|
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |