Oracle Database Security Overview – Part 2 -> Security Enhancements
In part two of this two part series on Oracle Database Security, Saurabh Gupta covers Oracle Database Security enhancements as well
Read moreIn part two of this two part series on Oracle Database Security, Saurabh Gupta covers Oracle Database Security enhancements as well
Read moreIn this two part series, Saurabh Gupta covers the fundamentals of database security solutions from Oracle. Virtual Private Database enforces
Read moreThis session provides a technical overview of how cloud computing can be made secure across various networks architectures and deployments.
Read moreWeb Security Dojo is a web application security lab with tools, targets, and training materials built into a Virtual Machine(VM).
Read moreAjax is perhaps the best known RIA technology today. While several implementations of Ajax have arrived, and many software projects
Read moreHP analyzed almost 4,000 web applications developed with Flash software and found that 35 percent violate Adobe security best practices.
Read moreA new security model Building Security In Maturity Model (BSIMM) has been released that describes the activities practiced by nine of
Read moreMore than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize
Read moreThe subject of threat models is quite interesting in the information security space. It talks about how we model the
Read more
You must be logged in to post a comment.