Agile Testing lecture for Software QA Testing students delivered by Iana Mourza at Portnov Computer School
Month: March 2018
Security can be considered at different levels, we can think about how can we make our connexions secure and avoid...
This video presents some of the common scenarios in which SQL Azure can be a good choice for data storage.
In this six part series of short videos, Bill Lodin of IT Mentors, uses a whiteboard to help illustrate why...
Trying to build an efficient and secure system is a hard task and no exact method or technique has been...
The proliferation of systems and their use by different entities and organisations raised a lot of questions about the security...
Authentication code In a military system, authentication should be secure unconditionally. Note that we studied digital signatures and message authentication...
The Clark-Wilson Model Author : Yongge Wang Confidentiality, integrity, and availability are three essential properties for both military and commercial...
Author : Denny Cherry One way to greatly improve your SQL Server's performance is to properly optimize the tempdb database. To punch...
Hi guys, today, I had really enough of backing up my databases due to lots of VM snapshots and restore....
We depend more and more on Internet technology. Everyday we interact and perform some tasks related to our life over...
Security has always been a major concern far before the appearance of computers, it had different applications and implementation but...
Source : http://www.creativecommit.com Below is a set of 10+ videos covering various topics of SQL server integration services 2008 (SSIS 2008)....
Microsoft plays a major role in the computing domain and is considered one of the leaders in term of solutions...
Security as a major concern can be addressed from different angles, even the security specialists might have different definitions and...