...Professional Summary: * Extensive Experience in MS SQL Server 2005/2008 and 2000 Database Administration and PL/SQL developer in Business Analyst including Planning, Deployment / Implementation and configuration. * Extensive experience in writing Complex Stored procedures as well analyzing and debugging existing complex stored procedures. * Successfully led, executed and maintained projects with multiple databases. * Implementing all kinds of SQL Server Constraints (Primary, Foreign, Unique, Check etc). * Generating complex Transact SQL (T-SQL) queries, Sub queries, Co-related sub queries, Dynamic SQL queries * Programming in SQL Server - Using the stored procedures, Triggers, User-defined functions and Views, Common table expressions (CTEs) * Proficient in creating T-SQL (DML, DDL, DCL and TCL), Indexes, Views, Temporally Tables, Table Variables, Complex Stored Procedures, System and User Defined Functions . * Strong experience in creating complex Replication, Index, Functions, DTS packages, triggers, cursors, tables, views and other SQL joins and statements. * Expertise in Client-Server Application Development using Oracle […] PL/SQL, SQL *PLUS, TOAD and SQL*LOADER. * Experience in understanding complicated performance issues and worked with DBA's to suggest valuable ways to fix the problem * Hands on experience working with SSIS, for ETL process ensuring proper implementation of Event Handlers, Loggings, Checkpoints, Transactions...
Words: 1001 - Pages: 5
...Database Tuning and Administration Guide for SP6.1 February 22, 2007 IBM Internet Security Systems, Inc. 6303 Barfield Road Atlanta, Georgia 30328-4233 United States (404) 236-2600 http://www.iss.net © IBM Internet Security Systems, Inc. 1994-2006. All rights reserved worldwide. Customers may make reasonable numbers of copies of this publication for internal use only. This publication may not otherwise be copied or reproduced, in whole or in part, by any other person or entity without the express prior written consent of Internet Security Systems, Inc. Patent pending. Internet Security Systems, System Scanner, Wireless Scanner, SiteProtector, Proventia, Proventia Web Filter, Proventia Mail Filter, Proventia Filter Reporter ADDME, AlertCon, ActiveAlert, FireCell, FlexCheck, Secure Steps, SecurePartner, SecureU, and X-Press Update are trademarks and service marks, and the Internet Security Systems logo, X-Force, SAFEsuite, Internet Scanner, Database Scanner, Online Scanner, and RealSecure registered trademarks, of Internet Security Systems, Inc. Network ICE, the Network ICE logo, and ICEpac are trademarks, BlackICE a licensed trademark, and ICEcap a registered trademark, of Network ICE Corporation, a wholly owned subsidiary of Internet Security Systems, Inc. SilentRunner is a registered trademark of Raytheon Company. Acrobat and Adobe are registered trademarks of Adobe Systems Incorporated. Certicom is a trademark and Security Builder is a registered trademark of Certicom...
Words: 5367 - Pages: 22
...Ilona Oganesyan 10905 Ambergate Ln Frisco, TX 75035 214-543-2190 ilonchik15@yahoo.com Education * Bachelor of Science in Computer Science – University of Texas at Dallas * Master of Science in Management and Administrative Sciences – Finance Concentration – University of Texas at Dallas Professional Certifications * Certified Project Management Professional Professional Skills * Microsoft Project, MS SQL development, MS SQL Server 2008, 2005, 2000, 7.0 design and administration, backup and recovery, T-SQL stored procedures, Query Analyzer; Oracle PL/SQL, Oracle Forms and Reports, Toad 9.0; SSRS reports development, Visual Basic 6.0, C+ +, C#; AS400 Advanced knowledge of Excel, including complex macros, VBA, Pivot Tables and Graphs; Access Form Design, Access Report Design, ADO; Visio Professional, JIRA, Remedy, Clear Quest,Clear Case SharePoint Professional Experience Fannie Mae May 10 – Present Project Manager II * Application Development team lead responsible for managing project delivery of multiple Adobe Flex applications * Provide project management services for the Credit Loss Management division * Identify and engage appropriate technical and business resources needed for successful project execution. * Manage project resources. * Provide technical and analytical guidance to project team * Prepare project execution plans and ensure projects are completed on schedule, within budget and meet all...
Words: 726 - Pages: 3
...SQL Server 2012 Security Best Practices - Operational and Administrative Tasks SQL Server White Paper Author: Bob Beauchemin, SQLskills Technical Reviewers: Darmadi Komo, Jack Richins, Devendra Tiwari Published: January 2012 Applies to: SQL Server 2012 and SQL Server 2014 Summary: Security is a crucial part of any mission-critical application. This paper describes best practices for setting up and maintaining security in SQL Server 2012. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual...
Words: 15647 - Pages: 63
...New Horizons Computer Learning Center of Cincinnati OFFICIAL MICROSOFT LEARNING PRODUCT 10174A Lab Instructions and Lab Answer Key: Configuring and Administering Microsoft® SharePoint® 2010 New Horizons Computer Learning Center of Cincinnati Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft® Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names...
Words: 74170 - Pages: 297
...BALTIMORE CITY COMMUNITY COLLEGE DIVISION OF BUSINESS, HEALTH, MATHEMATICS AND SCIENCE BUSINESS, MANAGEMENT AND TECHNOLOGY DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use...
Words: 856 - Pages: 4
...Cheeper Sales and Graphics: Accounting System CMGT 555 Cheeper Sales and Graphics: Accounting Management System Cheeper Sales and Graphics have enlisted the services of a third party software design company to assist in developing an online centralized accounting management system. Currently, there is no accounting management system in place to reference or build off. Therefore, the members of both companies are working together to design and develop a system from scratch that fulfills the companies technical, performance, usability, reliability, and security requirements. Technical Aspects Software Requirements: Cheeper Sales and Graphics is listing the following requirements that must be incorporated in the new accounting managements system. The accounting management system will be developed on one of the backbone software of the consulting team owns management application this type of service products simplify data protection in even the most challenging heterogeneous environments, enables administrators to easily and cost-effectively achieve maximum data availability, while protecting against multiple types of failures and reporting on their storage environment ("Quest Software", 2013). This type of product includes backup and recovery, real-time protection and application data protection. This type of software will be uniquely planned to meet the following main features as described by the staff...
Words: 1585 - Pages: 7
...Admirim Ymeri Jordan Misja, Tirana, Albania Telephone: +355 69 3919969 (mobile) e-mail: adiymeri@hotmail.com Summary • Very good knowledge on IT systems, global system analysis, developing, testing and managing of software in several programming languages. Software Engineering, Software Analyst, Database designer and Administrator in ORACLE, SQL Server DBMS, PostgreSQL, etc., Software Designer, Software Developer, Network and System Administrator. • Experience managing national level large scale IT projects. • Experience in software development, through the full cycle, for requirements analysis, detailed specifications, project planning, resource management, implementation, testing and beyond. • Fluency in English, Italian, Albanian with intermediate knowledge of French and German Experience Database Designing Consultancy 03/2010-present Immovable Property System (IPS) Land Administration and Management Project (LAMP) Immovable Property Registration Office (IPRO) • Develop and maintain the database, database applications, database interface functions (data entry forms and reports) and products. • Create, maintain, install, modify and test modules for the database and user interface of the IPS. • Prepare comprehensive written user manual/guideline to use, maintain and update the database produced. A first draft of the user manuals should be ready at the end of the...
Words: 776 - Pages: 4
...Executive summary The organization information system is backbone of organizational operational and functional units, the malware can produce potential threat to organization image, the establishment of an effective security measures and reassessment of organizational risk management approaches in order to cater with latest implication trend in network security. This report is based on literature review, analytical analysis of case studies, news articles magazines to highlight vulnerability and implication of malware attack to an organization, highlights the salient features of malware attack, malware attacks that can significantly hurt an enterprise information system, leading to serious functional commotions, can result into destructing the basic IT security up to identity theft, leakage of data, stealing private information, corporate information system blue prints, industrial white papers and networks break down. The only constant in the world of technology is a change, report highlights the latest trends, dimension and implication of malware attack and new critical source of threats, within the perspective of constantly changing IT world (e.g. cloud services-integration) Enterprise may not effectively device and manage malware threat and 'risk assessment processes. This report highlight the malware propagation process, malware vulnerability, the types of malware, optimistic cost effective solution in order to minimize security risk for an Enterprise information...
Words: 3648 - Pages: 15
...EC-Council Press | The Experts: EC-Council EC-Council’s mission is to address the need for well educated and certified information security and e-business practitioners. EC-Council is a global, member based organization comprised of hundreds of industry and subject matter experts all working together to set the standards and raise the bar in Information Security certification and education. EC-Council certifications are viewed as the essential certifications needed where standard configuration and security policy courses fall short. Providing a true, hands-on, tactical approach to security, individuals armed with the knowledge disseminated by EC-Council programs are securing networks around the world and beating the hackers at their own game. The Solution: EC-Council Press The EC-Council | Press marks an innovation in academic text books and courses of study in information security, computer forensics, disaster recovery, and end-user security. By repurposing the essential content of EC-Council’s world class professional certification programs to fit academic programs, the EC-Council | Press was formed. With 8 Full Series, comprised of 27 different books, the EC-Council | Press is set to revolutionize global information security programs and ultimately create a new breed of practitioners capable of combating this growing epidemic of cybercrime and the rising threat of cyber war. This Certification: C|EH – Certified Ethical Hacker Certified Ethical Hacker is a certification...
Words: 61838 - Pages: 248
...Microsoft Access or Microsoft SQL Server: What's Right in Your Organization? SQL Server Technical Article Writers: Luke Chung Technical Reviewer: Matt Nunn Published: December 2004, revised July 2006. Applies To: SQL Server 2005 Summary: This paper explains how Microsoft® Access is used within an organization. It also explains when to use Access and when to use Microsoft SQL Server™. Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering...
Words: 6412 - Pages: 26
...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...
Words: 125224 - Pages: 501
...------------------------------------------------- // Interface ------------------------------------------------- // ------------------------------------------------- public interface IChoice ------------------------------------------------- { ------------------------------------------------- string Buy(); ------------------------------------------------- } ------------------------------------------------- A new class will be added and this class we will be called factory class. This class sits between the client class and the business class and based on user choice it will return the respective class object through the interface. It will solve problem 3// ------------------------------------------------- // Factory Class ------------------------------------------------- // ------------------------------------------------- public class FactoryChoice ------------------------------------------------- { ------------------------------------------------- static public IChoice getChoiceObj(string cChoice) ------------------------------------------------- { ------------------------------------------------- IChoice objChoice=null; ------------------------------------------------- if (cChoice.ToLower()...
Words: 4323 - Pages: 18
...Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________. firewall 2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7. Network and Sharing Center 3. A device that connects one network to another is called a __________________. router 4. The most common method for illustrating the operations of a networking stack is the __________________, which consists of __________________ layers. Open Systems Interconnection (OSI) reference model, seven 5. Protocols that do not guarantee delivery of their data, but do operate with a very low overhead that conserve network bandwidth are called __________________. connectionless protocols 6. The Windows 7 command-line utility that can tell you if the TCP/IP stack of another system on the network is functioning normally is called __________________. Ping.exe 7. The Windows 7 command-line utility that enables you to generate DNS request messages and then transmit them to specific DNS servers on the network is called __________________. Nslookup.exe 8. Most networks use __________________ to dynamically assign addresses and configure computers to use them. Dynamic Host Configuration...
Words: 2707 - Pages: 11
...packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave & Buster's, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. A packet sniffer is "a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network" (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord, 2008). Legitimate and illegitimate usage will be explained in later sections. Packet sniffing programs can be used to perform man-in-the-middle attacks (MITM). This type of attack occurs when "an attacker...
Words: 2443 - Pages: 10