Database testing

Results: 337



#Item
161Financial services / Financial markets / Institutional investors / Interactive Data Corporation / Valuation / Stock market index / Fair value / Database trigger / Mutual fund / Financial economics / Finance / Investment

Press Release Interactive Data Survey Highlights Importance of Fair Value Practices During Volatile Markets Mutual Fund Firms Provide Insight on Triggers, Benchmarks and Back-Testing of Performance Data

Add to Reading List

Source URL: www.interactivedata-prd.com

Language: English - Date: 2015-01-09 17:29:50
162Software testing / Hacking / Vulnerability / Database / Data validation / JavaScript / Information security audit / Software security assurance / Cyberwarfare / Computing / Computer security

Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:53
163Database management systems / Software testing / Software optimization / Relational database management systems / Transaction processing / Oracle Exadata / Benchmark / Oracle Database / Scalability / Computing / Software / Information technology management

1 Adaptik PolicyWriter and Oracle Exadata Benchmark White Paper Kevin Zou, Oracle Exadata Senior Sales Consultant

Add to Reading List

Source URL: adaptik.com

Language: English - Date: 2013-12-12 09:24:37
164Unit testing / Self / Database refactoring / Software development / Extreme programming / Code refactoring

How to Approach Refactoring Venkat Subramaniam [removed] twitter: venkat_s

Add to Reading List

Source URL: www.agiledeveloper.com

Language: English - Date: 2010-08-05 09:38:22
165Computing / Cross-platform software / Software / Ingres / Software testing / Load testing / SQL / Database / Relational database management systems / Data management / Database management systems

INGRES QRP QUERY – RECORD – PLAYBACK Performance and Load Testing for Ingres Applications Eliminate the Risk of change through realistic stress and volume testing using Actual production workloads and workflow Ingres

Add to Reading List

Source URL: supportservices.actian.com

Language: English - Date: 2011-12-03 20:03:30
166Computer network security / Software testing / Rapid7 / Metasploit Project / Vulnerability scanner / Cornell University / Vulnerability / Software / Computer security / System software

Database Security Case Study Weill Cornell Medical College Relies on Rapid7 Nexpose for a Secure Environment Diverse and Demanding Computer Operations With the university’s main campus in Ithaca, the Weill Cornell IT

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:53:23
167Cyberwarfare / Hacking / Software testing / Electronic commerce / Rapid7 / Database security / Vulnerability management / Vulnerability / Social vulnerability / Computer security / Software / Computer network security

Vulnerability Management Case Study The City of Philadelphia Gains an Eagle Eye View of their Network With the number of network attacks on the rise, data security is an issue of increasing concern. Government agencies

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:53:34
168Computer network security / Software testing / Electronic commerce / Rapid7 / Metasploit Project / Vulnerability scanner / Nessus / Credit cards / Data privacy / Computer security / Software / System software

Database Security Case Study Rapid7 Nexpose Helps to Protect Huge IT Infrastructure at Virginia Tech An IT Leader Virginia Tech has long been in the forefront of information technology. The

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:54:17
169Computer network security / Software testing / Hacking / Rapid7 / Penetration test / Vulnerability / White hat / Database security / Password / Computer security / Software / System software

Database Security Case Study OneLogin Builds Customer Trust with Rapid7 Application Penetration Testing About OneLogin The rise of cloud applications complicates management and security of user accounts.

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:54:23
170Cyberwarfare / Software testing / Relational database management systems / SQL / SQL injection / Imperva / Vulnerability / Web application security / Penetration test / Computing / Computer security / Computer network security

January 2013 Hacker Intelligence Initiative, Monthly Trend Report #15 Lessons Learned From the Yahoo! Hack How SQL Injection Vulnerabilities in Third-Party Code Can Make for Security Cloudy 1. Executive Summary

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2013-01-28 14:35:53
UPDATE