Skip to main content

By clicking Submit, you agree to the developerWorks terms of use.

The first time you sign into developerWorks, a profile is created for you. Select information in your developerWorks profile is displayed to the public, but you may edit the information at any time. Your first name, last name (unless you choose to hide them), and display name will accompany the content that you post.

All information submitted is secure.

  • Close [x]

The first time you sign in to developerWorks, a profile is created for you, so you need to choose a display name. Your display name accompanies the content you post on developerworks.

Please choose a display name between 3-31 characters. Your display name must be unique in the developerWorks community and should not be your email address for privacy reasons.

By clicking Submit, you agree to the developerWorks terms of use.

All information submitted is secure.

  • Close [x]

Background image for security site banner

Tab navigation

05 Feb 2013

Top story

Who’s Doing What in Your Database?

Organizations need a database activity monitoring solution that efficiently enables quick detection of unauthorized intrusion and provides reporting and analysis capabilities that present a clear picture of data access activities on a System z server. This article describes how IBM InfoSphere Guardium can be used to achieve these goals.

Featured topics

  • Current tools for fraud detection. Listen in as Jeffrey Douglas discusses the current cost and sophistication of online fraud, the lifecycle of intelligent investigation, and the unique and powerful solution set that IBM brings to bear on the problem with products such as IBM Content Analytics, IBM Case Manager, and i2.

  • DevOps distilled: A new look at DevOps. In this series of articles, learn about DevOps and how it can: create a collaborative relationship between development and IT operations; enable high deployment rates; and increase the reliability, resilience, and security of your production environment.

  • Look-ahead Java deserialization. When Java serialization is used to exchange information between a client and a server, attackers can try to replace the legitimate serialized stream with malicious data. Understand the nature of this threat and learn a simple way to protect against it.

  • Ready for IBM Security Intelligence. Russ Warren announces the launch of the Ready for IBM Security Intelligence program and discusses the program's presence on developerWorks.

Help: Update or add to My dW interests

What's this?

This little timesaver lets you update your My developerWorks profile with just one click! The general subject of this content (AIX and UNIX, Information Management, Lotus, Rational, Tivoli, WebSphere, Java, Linux, Open source, SOA and Web services, Web development, or XML) will be added to the interests section of your profile, if it's not there already. You only need to be logged in to My developerWorks.

And what's the point of adding your interests to your profile? That's how you find other users with the same interests as yours, and see what they're reading and contributing to the community. Your interests also help us recommend relevant developerWorks content to you.

View your My developerWorks profile

Return from help

Help: Remove from My dW interests

What's this?

Removing this interest does not alter your profile, but rather removes this piece of content from a list of all content for which you've indicated interest. In a future enhancement to My developerWorks, you'll be able to see a record of that content.

View your My developerWorks profile

Return from help