A directory of resources inthe field of technical communication.

Design>Information Design>Security

4 found.

About this Site | Advanced Search | Localization | Site Maps



Policies and Time

A new study suggests that many IT security practices are really just so much security theater. Jason asks about other moments in university life when the cost of complying with a policy exceeds its benefits.

Jones, Jason B. Prof Hacker (2010). Articles>Information Design>Security>Assessment


Securing a MySQL Server on Windows

Windows servers can be difficulty to keep secure. The intent of this article is to list the steps that an administrator can take to properly secure a MySQL installation on Windows. While the procedures listed are written for Windows users, the principles contained herein will be of benefit to users of Linux and Unix as well.

Hillyer, Mike. MySQL (2005). Design>Information Design>Security>SQL


Securing Information Assets   (peer-reviewed)   (members only)

In today’s competitive environment, organizations succeed or fail based on how well they manage information. To address this reality, organizations spend millions, if not billions, on securing their information advantages. New information technologies and methodologies are adopted, while old ones are dismantled or upgraded. To win, the information manager must constantly seek to outperform his or her competition. In this article the author asks how he or she does it? Perhaps by acquiring the best new technologies, hiring the most intelligent information professionals, and continuously keeping a watchful eye on the future. But, he asks, does having the best information, the best information systems, and the best information professionals, really pay off? Is there victory in sight? Or, is this just a continuous game with no clear winners?

Desouza, Kevin C. Business Information Review (2009). Articles>Management>Information Design>Security


Securing XML - Case Studies from the Financial Services Industry

XML is becoming the de facto business document interchange language for the Internet. Technologies such as SOAP and EBXML have been developed within the XML framework. Digital security standards and techniques are now being applied to XML, and to 'business webs' built using XML and Web Services. This presentation discusses these initiatives and the issues being encountered when applying security principles of confidentiality and non-repudiation to XML. Drawing on practical experience in Vordel projects, this presentation looks at how Web Services can be applied in the Financial Services industry to provide for improved secure partner and customer integration for the delivery of products and services.

O'Neill, Mark. IDEAlliance (2004). Articles>Information Design>Security>XML

Follow us on: TwitterFacebookRSSPost about us on: TwitterFacebookDeliciousRSSStumbleUpon