Get the domain knowledge you need to develop real-world business apps for and in the cloud. You’ll see how Oracle APEX has made the life of web developers much easier and how it helps you create web-based data-centric applications easily and instantly without writing screeds of code.In Cloud Computing Using Oracle Application Express, you will develop a complete general ledger accounting system named the Cloud Accountant which will be accessible through a variety of devices including desktops, laptops, and the latest smartphones. This new edition also incorporates the new application page creation process, which differs from the previous version. You’ll cover other new areas, such as the updated UI elements and properties, and the interactive grid. Besides the development of a full application that you can deploy in your organization, the book teaches many new techniques to further enhance your APEX development skills.What You Will LearnDiscover new development techniques for APEX developersDevelop cloud-based ERP applicationsBuild a cloud-based application on Oracle APEXIntegrate the free JasperReports server and report designing tool with Oracle APEXWho This Book Is ForWeb developers who possess some working knowledge of Oracle Application Express, and developers who have been using Oracle Forms and now wish to use their existing SQL and PL/SQL expertise.
Название: Blockchain for healthcare systems ISBN: 0367693526 ISBN-13(EAN): 9780367693527 Издательство: Taylor&Francis Рейтинг: Цена: 17609.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues. It also provides in-depth knowledge regarding blockchain in healthcare and the underlying components.This book explores securing healthcare data using blockchain technology. It discusses challenges and solutions for blockchain technology in the healthcare sector and presents the digital transformation of the healthcare sector using different technologies. It covers the handling of healthcare data/medical records and managing the medical supply chain all using blockchain technology.The contents of this book are highly beneficial to educators, researchers, and others working in a similar domain.
Автор: Azad, Tariq Название: Securing Citrix Xenapp Server In The Enterprise ISBN: 1597492817 ISBN-13(EAN): 9781597492812 Издательство: Elsevier Science Рейтинг: Цена: 7832.00 р. Наличие на складе: Поставка под заказ.
Описание: Citrix Presentation Server allows remote users to work off a network server as if they weren`t remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. This book offers step-by-step instructions for a secure Citrix Presentation Server.
Автор: Carter Peter A. Название: Securing SQL Server: Dbas Defending the Database ISBN: 1484241606 ISBN-13(EAN): 9781484241608 Издательство: Springer Рейтинг: Цена: 9083.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The multi-layered approach in this book helps ensure that a single breach does not lead to loss or compromise of confidential, or business sensitive data.
Database professionals in today’s world deal increasingly with repeated data attacks against high-profile organizations and sensitive data. It is more important than ever to keep your company’s data secure. Securing SQL Server demonstrates how developers, administrators and architects can all play their part in the protection of their company’s SQL Server enterprise.
This book not only provides a comprehensive guide to implementing the security model in SQL Server, including coverage of technologies such as Always Encrypted, Dynamic Data Masking, and Row Level Security, but also looks at common forms of attack against databases, such as SQL Injection and backup theft, with clear, concise examples of how to implement countermeasures against these specific scenarios. Most importantly, this book gives practical advice and engaging examples of how to defend your data, and ultimately your job, against attack and compromise.
What You'll Learn
Perform threat analysisImplement access level control and data encryptionAvoid non-reputability by implementing comprehensive auditingUse security metadata to ensure your security policies are enforcedMitigate the risk of credentials being stolenPut countermeasures in place against common forms of attack
Who This Book Is For
Database administrators who need to understand and counteract the threat of attacks against their company’s data, and useful for SQL developers and architects
Автор: Gallagher Scott Название: Securing Docker ISBN: 1785888854 ISBN-13(EAN): 9781785888854 Издательство: Неизвестно Рейтинг: Цена: 5516.00 р. Наличие на складе: Нет в наличии.
Описание: Presents solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as industrial sites, air transport, gas, healthcare, and finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches.
Автор: Lim, Ian , Coolidge, E. Coleen , Hourani, Paul Название: Securing Cloud and Mobility ISBN: 0367380366 ISBN-13(EAN): 9780367380366 Издательство: Taylor&Francis Рейтинг: Цена: 9033.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: A practitioners' handbook on securing virtualization, cloud computing, and mobility, this book bridges academic theory with real world implementation. It provides pragmatic guidance on securing the multi-faceted layers of private and public cloud deployments as well as mobility infrastructures. The book offers in-depth coverage of implementation plans, workflows, process consideration points, and project planning. Topics covered include physical and virtual segregation, orchestration security, threat intelligence, identity management, cloud security assessments, cloud encryption services, audit and compliance, certifications, secure mobile architecture and secure mobile coding standards.
Автор: Franklin Jr., Curtis Название: Securing the Cloud ISBN: 1466569204 ISBN-13(EAN): 9781466569201 Издательство: Taylor&Francis Рейтинг: Цена: 9492.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern.The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
Автор: Kevin Foltz, William R. Simpson Название: Enterprise Level Security, 1 ISBN: 1498764452 ISBN-13(EAN): 9781498764452 Издательство: Taylor&Francis Рейтинг: Цена: 16078.00 р. Наличие на складе: Поставка под заказ.
Описание:
Enterprise Level Security: Securing Information Systems in an Uncertain World provides a modern alternative to the fortress approach to security. The new approach is more distributed and has no need for passwords or accounts. Global attacks become much more difficult, and losses are localized, should they occur. The security approach is derived from a set of tenets that form the basic security model requirements. Many of the changes in authorization within the enterprise model happen automatically. Identities and claims for access occur during each step of the computing process.
Many of the techniques in this book have been piloted. These techniques have been proven to be resilient, secure, extensible, and scalable. The operational model of a distributed computer environment defense is currently being implemented on a broad scale for a particular enterprise.
The first section of the book comprises seven chapters that cover basics and philosophy, including discussions on identity, attributes, access and privilege, cryptography, the cloud, and the network. These chapters contain an evolved set of principles and philosophies that were not apparent at the beginning of the project.
The second section, consisting of chapters eight through twenty-two, contains technical information and details obtained by making painful mistakes and reworking processes until a workable formulation was derived. Topics covered in this section include claims-based authentication, credentials for access claims, claims creation, invoking an application, cascading authorization, federation, and content access control. This section also covers delegation, the enterprise attribute ecosystem, database access, building enterprise software, vulnerability analyses, the enterprise support desk, and network defense.
Описание: The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. <br><br><em>Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection</em> provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.
Описание: Computer forensics touches on a lot of skills - from answering legal or investigative questions to preparing for an investigation, evidence acquisition, and more. The goal of this book is to acquaint you with some of the forensic tools and techniques to successfully investigate cybercrimes, and become a proficient computer forensics investigator.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru