Tomorrow: Coming from a Lab Near You

November 2006
Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p25
Trade Publication
The article reports on several products related to security systems. Prof. Russel Cowburn of Imperial College London, England invented Laser Surface Authentication which reads the surface of the structure of an object using a laser scanner. However, Structured Query Language from Secerno detects and prevents abnormal transactions from reaching the data by building a model to understand its normal usage.


Related Articles

  • NEW PRODUCTS.  // SQL Server Magazine;Mar2010, Vol. 12 Issue 3, p46 

    The article reviews several computer softwares including the Diagnostic Manager 6.1 from Idera, JAMS 4.9 job scheduling solution from MVP Systems Inc., and Secerno DataWall 4.1 threat-blocking solution from Secerno.

  • Tools and techniques to help you discover SQL Server security weaknesses. Kiely, Don // SQL Server Magazine;May2008, Vol. 10 Issue 5, p27 

    The article provides several tools and techniques which provides security to the SQL Server system. According to the author, it is essential to know the capabilities of the system first before applying these tools. In addition, among the security tools being presented include the Absinthe, which...

  • Inside SQL Server 2005 Security. Delaney, Kalen // SQL Server Magazine;May2004, Vol. 6 Issue 5, p37 

    Explains the administration of computer security applications in the SQL 2005 Server through user-schema separation. Discussion of the evolution context of programmable modules; Factors to consider for which operation to choose; Analysis of backward compatibility. INSET: New DDL.

  • ACCESS SECURE to Report Data. de Clercq, Jan // SQL Server Magazine;Jun2007, Vol. 9 Issue 6, p35 

    The article reports on the significance on the use of SQL Server Reporting Services (SSRS) access-control model as reporting system. It is stated that SSRS can simplify in securing the reporting data by using role-based access control (RBAC) model to leverage the existing Windows200 Active...

  • Google Patches Apps, Services in Response to Heartbleed Flaw. Weiss, Todd R. // eWeek;4/13/2014, p1 

    The article discusses how Google responded to the Heartbleed security vulnerability by applying patches to key user services including Search, Gmail and YouTube. It notes that Google is currently patching Cloud SQL while users are advised to use the IP whitelisting function to ensure only known...

  • Consolidation has begun…but it's a rocky road. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);May2006, p47 

    This article highlights the trends in computer security in June 2006. The trends focused on both macro and micro scales. Companies quite rightly shied away from early IPSs because the fear of false positives outweighed their frustrations with the IDS alert flood, but modern products are far more...

  • Hacker tracker.  // CRN;6/6/2005, Issue 1150, p48 

    The article focuses on computer security in relation to various ways in which a computer hacker hacks a computer. One of the computer security software's "Coldfusion MX" fixes cross-site scripting vulnerability. A cross-site scripting vulnerability was discovered in ColdFusion MX's error page...

  • The Design of SQL Injection Analysis System based on Honeynet. Zelong Yin; Zhen Niu; Feifan Tong // Proceedings of the International MultiConference of Engineers & ;2013, p1 

    Along with the development of Browser/Server Application Development, SQL injection attacks threaten the security of Web Services more greatly, which bring enormous potential risks to data of users and service providers. Focusing on SQL injection, we designed an analysis system based on Honeynet...

  • NEWS BRIEFS.  // SC Magazine: For IT Security Professionals (15476693);Mar2011, Vol. 22 Issue 3, p12 

    This section offers news briefs on cyber security as of March 2011. The exploit of a structured query language (SQL) injection vulnerability on PlentyOfFish.com has posed a risk to the credentials of 30 million online users. The social networking site Facebook has launched a security feature,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics