4,329 Results for:SQL Server Security

  • Sort by: 

NoSQL DBMS (Not only SQL database management system)

Understanding the types of NoSQL DBMSes that are available is an important requirement for modern application development. Read Full Definition

Associated Glossaries

security information and event management (SIEM)

Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security.  Read Full Definition

Associated Glossaries

context-aware security

Context-aware security is the use of situational information (such as identity, location, time of day or type of endpoint device) to improve information security decisions. Read Full Definition

Associated Glossaries

offensive security

Offensive security is a proactive and antagonistic approach to protecting computer systems, networks and individuals from attacks. Read Full Definition

Associated Glossaries

hardware security

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. The term also refers to the protection of ... Read Full Definition

application security

Application security is the use of software, hardware, and procedural methods to protect applications from external threats. Once an afterthought in software design, security is becoming an increasingly important ... Read Full Definition

Associated Glossaries

Cloud Security Alliance (CSA)

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computing. Read Full Definition

managed security services (MSS)

Managed security services (MSS) is a systematic approach to managing an organization's security needs. Read Full Definition

Cyber Security Challenge UK

Cyber Security Challenge UK is a not-for-profit British company that runs IT security-related competitions with the aim of attracting talented people to the IT security industry. Read Full Definition

Associated Glossaries

Microsoft Exchange 2010 Mailbox Server Role Requirements Calculator

The Microsoft Exchange 2010 Mailbox Server Role Requirements Calculator is a free, downloadable tool from Microsoft that helps Exchange 2010 administrators design their mailbox server role so that it is optimized ... Read Full Definition