Skip to content
Divya Aradhya
About
Posts
Papers & Presentations
Categories
Application Security
Capture The Flag
Cloud Computing Security
Cybersecurity Compliance
Cybersecurity Strategic Planning
Database Security
Information Security
Management of Information Security
Network Security
Penetration Testing and Ethical Hacking
Web Security Management
Contact
Divya Aradhya
Information Security
Primary Menu
About
Posts
Papers & Presentations
Categories
Application Security
Capture The Flag
Cloud Computing Security
Cybersecurity Compliance
Cybersecurity Strategic Planning
Database Security
Information Security
Management of Information Security
Network Security
Penetration Testing and Ethical Hacking
Web Security Management
Contact
X
About
Posts
Papers & Presentations
Categories
Application Security
Capture The Flag
Cloud Computing Security
Cybersecurity Compliance
Cybersecurity Strategic Planning
Database Security
Information Security
Management of Information Security
Network Security
Penetration Testing and Ethical Hacking
Web Security Management
Contact
Category:
Database Security
Security Awareness and Training: SANS Guidelines
Automated tools for passive and active reconnaissance
Nortel: Database hack, industrial espionage, and banckruptcy
Database Transactions – Fraud, Security and the “Halloween Problem”
SQL injection attack: i-dressup.com data breach
Database Access Control on Data Creation
Creating a SQL Server 2008 Database Account
NoSQL Database: MongoDB
Lab: Tables & Databases
Do you see any drawbacks for transaction logs?
In what situations or scenarios are transaction logs helpful and important?
What is a transaction log in SQL?
SQL Statements
Heartland Payment Systems breach: An InfoSec History Lesson