13:15 Tech talk: (2 of 3: Demo) What is What is this thing called Hadoop and how do I secure it? Kathryn Zeidenstein 42 views - 11 years ago
28:10 Tech talk: (3 of 3: Details) What is What is this thing called Hadoop and how do I secure it? Kathryn Zeidenstein 31 views - 11 years ago
23:38 Tech talk: (1 of 3: Intro) What is What is this thing called Hadoop and how do I secure it? Kathryn Zeidenstein 65 views - 11 years ago
15:49 Tech Talk- Making the Most of InfoSphere Guardium Vulnerability Assessment (1 of 3) Kathryn Zeidenstein 289 views - 11 years ago
17:02 Tech Talk- Using InfoSphere Guardium Vulnerability Assessment for PeopleSoft Kathryn Zeidenstein 250 views - 11 years ago
45:12 Tech Talk Tutorial: Using the InfoSphere Guardium Vulnerability Assessment Query-based Test Builder Kathryn Zeidenstein 604 views - 11 years ago
50:23 Tech Talk: Getting Started with InfoSphere Guardium Vulnerability Assessment Kathryn Zeidenstein 1.4K views - 11 years ago
56:03 Tech Talk: Take a RESTful look at InfoSphere Guardium APIs Kathryn Zeidenstein 465 views - 11 years ago
4:36 InfoSphere Guardium Data Activity Monitoring for IBM i Kathryn Zeidenstein 2.9K views - 13 years ago
6:36 Demonstration of InfoSphere Guardium activity monitoring of Hadoop Kathryn Zeidenstein 272 views - 13 years ago