As organizations strive to deliver always-on access to applications users, it can be challenging to provide authorized access while simultaneously protecting against cyber-attacks. To address these ...
[Excerpted from "Protecting Databases From Web Applications," a new report published today in Dark Reading's Database Security Tech Center.] Web applications are rich targets for attackers. Available ...
Want to improve the integrity of your data? Place constraints in the database, as well as in your application. NoSQL, the catchall phrase for non-relational databases, is all the rage among Web ...
Practical PHP and MySQL: Building Eight Dynamic Web Applications demonstrates that it’s easy to build commercial-quality Web applications using free and open source software. The book walks you ...
Web applications are able to protect your Web assets from attack – especially websites. Discover the best Web application firewalls, as we explore the market and recommend our top choices. Websites ...
One of the interesting design challenges facing the people supporting the IEED research effort discussed yesterday involves how much of the key applications to embed in the database design. In that ...
We’ve all done it. We needed to pull data out of an SQL database, and the query we needed to pull out data was a complex query with multiple table joins, complex filter criteria, and sophisticated ...
Blist, launching today at Demo 2008, is a Web-based database with a very slick Flash interface running against a SQL backend. The user interface shields the complexity of the relational database ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results