MAGAZINES

MC Press Resource Centers
MC Systems Insight
MC Power Technology Manager
MC RPG Developer
MC Power Developer
MC TNT Tips 'n Techniques
MC AIX Expert
MC Linux Expert
MC Mobile on Power

May 29, 2009 | Vol 6 Issue 21

 

In This Issue:

Feature Article - TechTip
 
TechTip: Managing Authorization Lists 101, Part III

Using authorization lists offers many advantages for those people charged with maintaining system and data security.

rafael_victoria_preira.jpgBy Rafael Victória-Pereira

A well-structured authorization scheme that includes both user groups and authorization lists by application or library type allows for better control over the whole system, thus preventing unpleasant surprises and reducing the unauthorized-access risk.


Read More >>


Feature Article - TechTip
 
New Tokenization Technology Promises to Streamline Encryption Key Management

Token Manager from nuBridges substitutes format-preserving tokens for sensitive data.

chris_smith.jpgBy Chris Smith

The number of electronic security breaches in the past year has climbed at a rate that makes one question whether moving to cloud computing at this time really make sense. Breaches during the past year exceeded that of the previous four years combined, and if that rate continues, the public will likely lose all faith in a company's ability to protect sensitive data--if it hasn't already.


Read More >>

Support MC Press - Visit our Sponsors

 

Forums Sponsor

 

 Popular Forums

POPULAR FORUMS

Forums

 

Search Sponsor
  
 

 Popular Searches

POPULAR SEARCHES

Search


Read More >>
   MC-STORE.COM