Portals eNewsletters Web Seminars dataWarehouse.com DM Review Magazine
DM Review | Covering Business Intelligence, Integration & Analytics
   Covering Business Intelligence, Integration & Analytics Advanced Search
advertisement

RESOURCE PORTALS
View all Portals

WEB SEMINARS
Scheduled Events

RESEARCH VAULT
White Paper Library
Research Papers

CAREERZONE
View Job Listings
Post a job

Advertisement

INFORMATION CENTER
DM Review Home
Newsletters
Current Magazine Issue
Magazine Archives
Online Columnists
Ask the Experts
Industry News
Search DM Review

GENERAL RESOURCES
Bookstore
Buyer's Guide
Glossary
Industry Events Calendar
Monthly Product Guides
Software Demo Lab
Vendor Listings

DM REVIEW
About Us
Press Releases
Awards
Advertising/Media Kit
Reprints
Magazine Subscriptions
Editorial Calendar
Contact Us
Customer Service

Security Portal

Staying a step ahead in the dynamic world of business intelligence and data warehousing is an exciting - but time-consuming - challenge for all IT professionals. To save you some valuable time, we have collected the latest resources to aid you in your quest for competitive advantage in the industry. Focusing on a specific aspect of the business intelligence and data warehousing industry, this Security resource portal proves to be an excellent channel for all users searching for specialized information. Read related editorial from DM Review magazine and DMReview.com, research our white paper library, and check the bookstore titles. We'll be adding new Security material as soon as it is published so bookmark this site and visit often!

RELATED ARTICLESSECURITY RELATED CONTENT

2006 Information Technology Trends for CIOs
By Scott Gnau and Ron Swift
Which trends will affect specific market spaces? Which will affect the CIO's capacity to positively influence business performance?

The Data Strategy Advisor
By Lou Agosta
Unintended Consequences: Whose Identity Is It Anyway?

Information Management
By Bill Inmon
Encryption at Rest

57 more related content available. Click Here!


WHITE PAPERSSECURITY WHITE PAPERS

Storage Area Networks: Data Security and Fabric Management
Available for download in: PDF format

Defending Vulnerabilities in an Oracle Environment
Available for download in: PDF format

Securing your Business Performance Management (BPM) Environment with Identity Solutions from Sun Microsystems
Available for download in: PDF format

Intrusion Prevention Systems: Next Generation Firewalls
Available for download in: PDF format

5 more whitepaper(s) available on this topic. Click Here!

Looking for other white papers? Visit the complete White Paper Library.


BOOKSSECURITY BOOKS


Cryptography in the Database: The Last Line of Defense
By Kevin Kenan

If hackers compromise your critical information, the results can be catastrophic. You're under unprecedented pressure—from your customers, your partners, your stockholders, and now, the government—to keep your data secure. But what if hackers evade your sophisticated security mechanisms? When all else fails, you have one last powerful line of defense: database cryptography. In this book, a leading crypto expert at Symantec demonstrates exactly how to use encryption with your own enterprise databases and applications.

(Review excerpt from Amazon.com)

21 more book(s) available on this topic. Click Here!


MORE RESOURCESMORE SECURITY RESOURCES

View Security industry events in our Industry Events Calendar.
Read product reviews on Security products.
Check out Security software demos.
Read Security questions and answers in Ask the Experts.

Interested in receiving an update of DMReview.com editorial on Security? Subscribe to our Content Alert e-mail. You'll receive a topic-specific e-mail focused on industry topics. Subscribe Here!



Portal Menu
Welcome
Articles & Columns
White Papers
Industry Events
Books
Newsletters
View all Portals
Advertisement
advertisement
Site Map Terms of Use Privacy Policy
SourceMedia (c) 2006 DM Review and SourceMedia, Inc. All rights reserved.
SourceMedia is an Investcorp company.
Use, duplication, or sale of this service, or data contained herein, is strictly prohibited.