103 Results for:DD
- Sort by:
Protecting petabytes: Best practices for big data backup
04 Jun 2012How do you protect the massive data sets? Learn the best practices and products used for big data backup disaster recovery. Read More
How to install a guest OS in VMware on Windows Server 2003: Windows series
29 Oct 2007The finish line is in site. That means it's time to install a guest operating system on VMware Server. Read this tip for Andrew Kutz's instructions. Read More
Use DFHLS2WS to expose CICS applications as a Web service
28 Oct 2008DFHLS2WS is one of the Web services assistants that allows traditional CICS applications to provide or consume Web services without significant changes and without getting into the details of SOAP or XML coding. Read More
Don't mistake user acceptance testing for acceptance testing
20 Nov 2007Despite the many references that concur on the definition of acceptance testing, people still get confused. Scott Barber clarifies things in this month's Peak Performance column. Read More
High availability with Flashback Database
27 Sep 2006Flashback Database is a new approach to point-in-time (PIT) database recovery. This incomplete recovery strategy can be used to recover a database that has been logically corrupted due to human error. Introduced ... Read More
Network session data analysis with Snort and Argus
01 Apr 2008This edition of Snort Report departs from the standard format to introduce Argus, a session data collecting tool that can work alongside Snort. Learn how session data can complement Snort's alert data for network ... Read More
MapReduce Part II
01 May 2008MapReduce is a distributed programming model intended for parallel processing of massive amounts of data. This article describes a MapReduce implementation built with off-the-shelf, open-source software components.... Read More
Traffic Talk: Testing Snort with Metasploit
02 Feb 2010Are your customers' network security solutions working as expected? Learn about testing Snort with Metasploit in this detailed tip from Richard Bejtlich, complete with code examples and step-by-step instructions. Read More
Best Practices for Risk-Free Deployment
01 Mar 2005The cost impact to a company of a failed project can be severe indeed. This document introduces the 3D™ methodology – a set of best practices and quality tools developed by BuildMonkey, which can be ... Read More
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
29 Sep 2014In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system. Read More