103 Results for:DD

  • Sort by: 

Protecting petabytes: Best practices for big data backup

By Todd Erickson 04 Jun 2012

How do you protect the massive data sets? Learn the best practices and products used for big data backup disaster recovery. Read More

How to install a guest OS in VMware on Windows Server 2003: Windows series

By Andrew Kutz 29 Oct 2007

The finish line is in site. That means it's time to install a guest operating system on VMware Server. Read this tip for Andrew Kutz's instructions. Read More

Use DFHLS2WS to expose CICS applications as a Web service

By Robert Crawford 28 Oct 2008

DFHLS2WS is one of the Web services assistants that allows traditional CICS applications to provide or consume Web services without significant changes and without getting into the details of SOAP or XML coding. Read More

Don't mistake user acceptance testing for acceptance testing

20 Nov 2007

Despite the many references that concur on the definition of acceptance testing, people still get confused. Scott Barber clarifies things in this month's Peak Performance column. Read More

High availability with Flashback Database

27 Sep 2006

Flashback Database is a new approach to point-in-time (PIT) database recovery. This incomplete recovery strategy can be used to recover a database that has been logically corrupted due to human error. Introduced ... Read More

Network session data analysis with Snort and Argus

By Richard Bejtlich 01 Apr 2008

This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network ... Read More

MapReduce Part II

01 May 2008

MapReduce is a distributed programming model intended for parallel processing of massive amounts of data. This article describes a MapReduce implementation built with off-the-shelf, open-source software components.... Read More

Traffic Talk: Testing Snort with Metasploit

By Richard Bejtlich 02 Feb 2010

Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions. Read More

Best Practices for Risk-Free Deployment

01 Mar 2005

The cost impact to a company of a failed project can be severe indeed. This document introduces the 3D™ methodology – a set of best practices and quality tools developed by BuildMonkey, which can be ... Read More

Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

29 Sep 2014

In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Read More