SlideShare a Scribd company logo
1 of 44
Download to read offline
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
How	MySQL	Security	and		
Enterprise	Features		
Assisting	you	with	GDPR	Compliance	
Mike	Frank	–	MySQL	Product	Management	Director	
Copyright © 2016, Oracle and/or its affiliates. All rights reserved.
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Safe	Harbor	Statement	
The	following	is	intended	to	outline	our	general	product	direction.	It	is	intended	for	
information	purposes	only,	and	may	not	be	incorporated	into	any	contract.	It	is	not	a	
commitment	to	deliver	any	material,	code,	or	functionality,	and	should	not	be	relied	upon	
in	making	purchasing	decisions.	The	development,	release,	and	timing	of	any	features	or	
functionality	described	for	Oracle’s	products	remains	at	the	sole	discretion	of	Oracle.	
2
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Program	Agenda	
Security	Challenges		
MySQL	Security	Solutions	and	GDPR	Overview	
The	Details	
New	Security	Features	in	MySQL	8	
1	
2	
3	
4	
Confidential	–	Oracle	Internal/Restricted/Highly	Restricted	 3
Copyright	©	2016,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
89%	
of	Organizations	Experienced	Data	
Breaches,	According	to	New	Ponemon	
Report	
Source:	Sixth	Annual	Benchmark	Study	on	Privacy	&	Security	of	Healthcare	Data,	
conducted	by	Ponemon	Institute	
4	
66%	
of	the	largest	businesses	in	the	UK	have	
suffered	a	cyberattack	or	data	breach	
within	the	past	twelve	months	
Source:	UK	government's	Cyber	Security	Breaches	Survey	2016	
25%	
experience	a	repeated	breach	at	least	one	a	
month		
Source:	UK	government's	Cyber	Security	Breaches	Survey	2016
Copyright	©	2016,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Mega	Breaches	
429	Million	identities	
exposed	in	2015.			
	 75%	Web	sites	with	vulnerabilities.	
15%	of	all	websites	had	a	
critical	vulnerability.		
9	
In	2015,	a	record	of	nine	
mega-breaches	were	
reported.		
One	worlds	largest	191M.	
(Mega-breach	=	more	than	10	million	records.)	
Mobile	Vulnerabilities	on	
the	rise	–	up	214%	
Infection	by	SQL	Injection	
still	strong.	
Malware	attacks	on	
databases	
5	
Source:	Internet	Security	Threat	Report	2016,	Symantec
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Complexity	grows	
Risk	Grows	
6
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Regulatory	Compliance	
•  Regulations	
–  PCI	–	DSS:	Payment	Card	Data	
–  HIPAA:	Privacy	of	Health	Data	
–  Sarbanes	Oxley,	GLBA,	The	USA	Patriot	Act:		
Financial	Data,	NPI	"personally	identifiable	financial	information”	
–  EU	General	Data	Protection	Directive:	Protection	of	Personal	Data	(GDPR)	
•  Requirements	
–  Continuous	Monitoring	(Users,	Schema,	Backups,	etc)	
–  Data	Protection	(Encryption,	Privilege	Management,	etc.)	
–  Data	Retention	(Backups,	User	Activity,	etc.)	
–  Data	Auditing	(User	activity,	etc.)	
7
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Large	Fines	
•  GDPR	
–  The	greater	of	20,000,000	Euros	or	4%	of	
annual	revenue	
•  PCI		
–  Range	from	$5,000	to	$500,000	
•  HIPAA	
–  Fines	up	to	$400	to	$50k	per	violation		(or	per	
record)	
Large	Losses	
•  $3.62	Million	–	Average	cost	of	a	
breach	
•  WW	$141	per	stolen	record	
–  The	average	per	capita	cost	of	data	breach	was	
$225	in	the	United	States		
•  Faster	the	data	breach	can	be	
identified	and	contained,	the	lower	
the	costs.		
	
Cost	of	Regulatory	Compliance	
8	
* Ponemon Institute’s 2017 Cost of Data Breach Study: Global Overview
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	and	European	Union	
General	Data	Protection	Regulation	
9
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Introduction	
•  The	E.U.	General	Data	Protection	Regulation	(GDPR)	comes	into	effect	in	
May	2018	
•  GDPR	is	a	European	Union	“EU”-wide	framework		
•  Published	May	2016,	Enforceable	by	May	2018	
•  Fines	for	GDPR	violations	are		
– The	greater	of	20,000,000	Euros	or	4%	of	annual	revenue	(R150,	A83)	
•  Exact	security	controls	are	not	specified	in	the	GDPR	
– WHAT	to	do		
– Not	HOW	to	do	it	
Confidential	–	Oracle	Internal	 10
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Appropriate	Security	Controls	
•  Data	must	be	processed	with	controls	that	provide																											
“appropriate	security	and	confidentiality	“		
– Recitals	of	note	-	R74-78,	R81,	R83,	R87,	R90,	A5,	A24-25,	A28,	A32,	A35)	
•  Exact	security	controls	are	not	specified	in	the	GDPR	
– WHAT	to	do		
– Not	HOW	to	do	it	
Confidential	–	Oracle	Internal	 11
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
EU	General	Data	Protection	Regulation	(GDPR)	
•  Data	privacy	as	a	fundamental	right	
Focus	is	on	3	Areas	
•  Assessment	–	Processes,	Profiles,	Data	Sensitivity,	Risks	
•  Prevention	–	Encryption,	Anonymization,	Access	Controls,	Separation	of	Duties	
•  Detection	–	Auditing,	Activity	monitoring,	Alerting,	Reporting	
	
Would	also	suggest	there	is	a	4th	
Recovery	–	Disaster	recovery		-	Backup/Restore,	HA	
	
12
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
GDPR	and	MySQL	
•  We	can’t	be	entirely	prescriptive	
•  We	have	many	things	that	can	be	applied	towards	attaining	compliance	
– Products	
– Features	
– Best	Practices	
– Documents	
– Integrations	
13
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
14	
Enterprise	
Security	Architecture	 ¡ ¡ Workbench
¡ ¡ Enterprise Monitor
¡ Enterprise Encryption
¡ ¡ Firewall
¡ Key Vault
¡ Enterprise Authentication
¡ Network Encryption
¡ Enterprise Audit
¡ Audit Vault
¡ Strong Authentication
¡ Access Controls
¡ Assess
¡ Prevent
¡ Detect
¡ Recover
¡  Enterprise Backup
¡ HA
• Innodb Cluster
¡ Thread Pool
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Assess	Security	Risks	
15	
Discover	
Personal	
Data	
Scan	
Security	
Configuration	
Privilege	
Analysis
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Assess	-	MySQL	Enterprise	Features	and	GDPR	
•  Assess	Risks	
– MySQL	Enterprise	Monitor	
•  Account	assessment	and	reporting	
•  Identifies	Security	Vulnerabilities	–	discover	security	holes,	advises	remediating	actions	
– Advisors	provide	rules	designed	to	enforce	security	best	practices	and	alert	upon	discovering	vulnerabilities	
– MySQL	Enterprise	Workbench	
•  Discover	tables	and	columns	containing	“Personal	Data”	
•  Data	Modeling	tool	-	Reverse	Engineering	of	Data	Model	to	review	data	stored	in	the	database	
•  Schema	Inspector,	Table	Inspectors	–	for	schema	assessment,	grant	inspection	
– MySQL	Security	Best	Practices	Guidelines	
	
16
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Monitor	
•  Enforce	MySQL	Security	Best	Practices	
–  Identifies	Vulnerabilities	
–  Assesses	current	setup	against	security	hardening	policies	
•  Monitoring	&	Alerting	
–  User	Monitoring	
–  Password	Monitoring	
–  Schema	Change	Monitoring	
–  Backup	Monitoring	
–  Configuration	Management	
–  Configuration	Tuning	Advice	
•  Centralized	User	Management	
17	
"I definitely recommend the MySQL Enterprise
Monitor to DBAs who don't have a ton of
MySQL experience. It makes monitoring
MySQL security, performance and availability
very easy to understand and to act on.”
Sandi Barr
Sr. Software Engineer
Schneider Electric
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Monitor	
•  Administrative	Privileges	
•  Database	Privileges	
•  Session	Limits	and	Object	Privileges	
•  User	privileges		
– Creating,	altering	and	deleting	databases		
– Creating,	altering	and	deleting	tables		
– Execute	INSERT,	SELECT,	UPDATE,	DELETE	queries		
– Create,	execute,	or	delete	stored	procedures	and	with	what	rights	
– Create	or	delete	indexes	
Assess	MySQL	Authorization	
18	
Security Privilege Management in MySQL Workbench
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Assess	your	data	and	data	model	using	MySQL	Workbench	
19
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Prevent	-	MySQL	Enterprise	Features	and	GDPR	
•  Prevent	Attacks	(Articles	32,	83,	28,	26,	5,	20,	27,	30,	64)	
– MySQL	Enterprise	Security	–	Transparent	Data	Encryption	
•  Includes	Key	Management	
•  Protects	Tablespace	via	Encryption,	Keys	via	Key	Manager/Vault	integration	
– MySQL	Enterprise	Security	–	Firewall	
•  MySQL	Firewall	Statement/User/IP	Whitelists,	Rules	
– MySQL	Enterprise	Security	– Authentication	
•  Centralized	Authentication	Infrastructure	
– DBA	configurable	IP	whitelisting,	Connection	Limits,	…	
•  Via	server	level	and	via	per	Account	IP/Hostname	Controls,	Account	resource	limits,		
– In	transit	data	encryption	-	
•  Full	support	for	TLS	1.2	-	X509,	Certificate	Authorities,	Exclude	Lists,	etc.	
20
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL Database
Encrypted
Tablespace
Files
Protected
Key
Hacker /
Dishonest OS User
Accesses
Files Directly
Information
Access Blocked
By Encryption
MySQL	Enteprise	Transparent	Data	Encryption	
Protects	against	Attacks	on	Database	Files
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
What	is	Transparent	Data	Encryption?	
•  Data	at	Rest	Encryption		
– Tablespaces,	Disks,	Storage,	OS	File	system	
•  Transparent	to	applications	and	users	
– No	application	code,	schema	or	data	type	changes	
•  Transparent	to	DBAs	
– Keys	are	hidden	from	DBAs,	no	configuration	changes	
•  Requires	Key	Management		
– Protection,	rotation,	storage,	recovery	
Confidential	–	Oracle	Internal/Restricted/Highly	Restricted	 22
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Using	MySQL	Transparent	Data	Encryption	is	EASY	
SQL	
•  	New	option	in	CREATE	TABLE	
ENCRYPTION=“Y”	
•  New	SQL	:	ALTER	INSTANCE	ROTATE	
INNODB	MASTER	KEY	
Plugin	Infrastructure	
•  New	plugin	type	:	keyring	
•  Ability	to	load	plugin	before	InnoDB	
initialization	:	--early-plugin-load	
Keyring	plugin	
•  Used	to	retrieve	keys		from	Key	Stores	
•  Over	Standardized	KMIP	protocol		
InnoDB	
•  Support	for	encrypted	tables	
•  IMPORT/EXPORT	of	encrypted	tables	
•  Support	for	master	key	rotation	
Confidential	–	Oracle	Internal/Restricted/Highly	Restricted	 23
Copyright	©	2016,	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
•  KMIP	–	Key	Management	Interoperability	
Protocol	(Oasis	Standard)	
•  Keys	are	protected	and	secure	
•  Enables	customers	to	meet	regulatory	
requirements	
•  KMIP	mode	tested	with	the	following	products	
–  Oracle	Key	Vault	(OKV)	
–  Gemalto	Safenet	KeySecure	
–  Fornetix	Key	Orchestration	Appliance	
•  Additional	Options	
–  New!	Encrypted	Key	Ring	File	
•  MySQL	5.7.21	
Also	
–  Cloud	Key	Services	
•  New!	features	coming	with	8.0	GA	
	
MySQL	Enterprise	Transparent	Data	Encryption	
KMIP	Compliant
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Firewall:	Overview	
25	
Inbound
SQL Traffic
Web
Applications
SQL Injection Attack
Via Brower
ALLOW
BLOCK
DETECT
1
2
3
Instance
MySQL Enterprise FirewallInternet
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Firewall	
•  Real	Time	Protection	
–  Queries	analyzed	and	matched	against	White	List	
•  Blocks	SQL	Injection	Attacks	
–  Block	Out	of	Policy	Transactions	
•  Intrusion	Detection	
–  Detect	and	Alert	on	Out	of	Policy	Transactions	
•  Learns	White	List		
–  Automated	creation	of	approved	list	of	SQL	command	patterns	on	a	per	user	basis	
•  Transparent	
–  No	changes	to	application	required	
•  New	Feature	in	5.7.20	–	Firewall	Rules	–	VIA	Audit	Plugin	abort()	
–  Create	more	general	allow/deny	firewall	rules	using	JSON	syntax.	
26	
MySQL Enterprise Firewall monitoring
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Authentication	
27	
•  Integrate	with	Centralized	Authentication	Infrastructure		
– Centralized	Account	Management	
– Password	Policy	Management	
– Groups	&	Roles	
Supports		
– Windows	Active	Directory	
– Linux	PAM	(Pluggable	Authentication	Modules)	
– New!	Native	LDAP	
•  Ultra	Fast	and	Flexible	
Integrates	MySQL	with	existing	
security	infrastructures
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Detect	-	MySQL	Enterprise	Features	and	GDPR	
•  Detect(Articles	30,	82,	33)	
– MySQL	Enterprise	Security	–	Audit	
•  Policy-based	auditing	solution	–	gather	audit	log	of	activity	
•  Use	to	spot	database	misuse	
•  Use	to	prove	compliance	to	GDPR	
– MySQL	Enterprise	Security	–	Firewall	
•  Real-time	protection	against	database	specific	attacks		
•  Use	to	alert	and/or	block	nefarious	activity	–	such	as	personal	data	leakage	
28
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Focus	on	MySQL	Enterprise	Audit	
•  Many	regulations	or	security	guidelines	–	for	example	GDPR	
–  Mandate	recording	or	auditing	of	the	activities	on	the	Personal	Data		
–  Recommend	records	must	be	maintained	centrally	-	responsibility	of	the	Controller.		
–  Processors	and	third-parties	must	not	be	able	to	tamper	or	destroy	the	audit	records.		
–  In	addition	to	book-keeping,	auditing	helps	in	forensic	analysis	in	case	of	a	breach.	
•  MySQL	Enterprise	Audit	data	can	be	
–  New!	Privileged	users	can	access	RO	via	SQL	(Often	DBA	SSH	access	to	server	is	forbidden)	
–  Maintained	in	Oracle	Audit	Vault	–	certified,	Splunk,	others		
–  Outputs	standard	XML	or	JSON	that	easily	integrate	with	various	3rd	party	solutions	
–  Supports	encryption	(MySQL	5.7.18+)	
–  Can	direct	security	logs	to	write-once	storage,		
29
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
MySQL	Enterprise	Audit	-	Work	Flow	
30	
•  NEW! SQL
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Detect	-	MySQL	Enterprise	Features	and	GDPR	
– MySQL	Enterprise	Workbench	
• Security	related	–		
– Inspect	Audit	Data	
– Configure	Firewall	
– Manage	Users	
– MySQL	Enterprise	Monitor	
• Monitor/Alert	on	Firewall,	Audit,	Backups	and	more	
• Detect	configuration	changes	
31
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Additional	Security	Controls	
Disaster	Recovery	-	ensure	availability	of	end-user	data	
•  Backup	
– MySQL	Enterprise	Backup		
•  Includes	encryption	
•  Support	for	MySQL	TDE	
– Oracle	Cloud	MySQL	database	service	includes	Backup	and	Recovery	
Confidential	–	Oracle	Internal	 32
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Additional	Security	Controls	
Disaster	Recovery	-	ensure	availability	of	end-user	data	
•  HA	
– Various	options		
•  MySQL	InnoDB	Cluster	
– Based	on	MySQL	Group	Replication	(mulit-master)	
•  Traditional	MySQL	Replication	Topologies	
Confidential	–	Oracle	Internal	 33
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Additional	Security	Controls	
Hashing,	Signing,	Encryption,	Key	Ring	Functions	
– Symmetric	Encryption	–	AES	
– Hashing	–	SHA-2,	SHA-1	
– Asymmetric	Public	Key	Encryption	(RSA)	
– Asymmetric	Private	Key	Decryption	(RSA)	
– Generate	Public/Private	Key	(RSA,	DSA,	DH)	
– Derive	Symmetric	Keys	from	Public	and	Private	Key	pairs	(DH)	
– Digitally	Sign	Data	(RSA,	DSA)	
– Verify	Data	Signature	(RSA,	DSA)	
– Validation	Data	Authenticity	(RSA,	DSA)	
– Get,	Put	Keys	with	ACLs	
Confidential	–	Oracle	Internal	 34
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
New	Security	Features	in	MySQL	8.0	
Confidential	–	Oracle	Internal/Restricted/Highly	Restricted	 35
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
New!	MySQL	Roles	
Improving	MySQL	Access	Controls	
•  Introduced	in	the	8.0.0	DMR	
•  Easier	to	manage	user	and	applications	rights	
•  As	standards	compliant	as	practically	possible	
•  Multiple	default	roles	
•  Can	export	the	role	graph	in	GraphML	
36	
Feature Request
from DBAs
Directly
In directly
Set Role(s)
Default Role(s)
Set	of	
ACLS	
Set	of	
ACLS
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
New!	Atomic	ACL	Statements	
•  Long	standing	MySQL	issue!		
– For	Replication,	HA,	Backups,	etc.	
•  Possible	now	-	ACL	tables	reside	in	8.0	InnoDB	Data	Dictionary	
•  Not	just	a	table	operation:	memory	caches	need	update	too	
•  Applies	to	statements	performing	multiple	logical	operations,	e.g.	
– CREATE	USER	u1,	u2	
– GRANT	SELECT	ON	*.*	TO	u1,	u2	
•  Uses	a	custom	MDL	lock	to	block	ACL	related	activity		
– While	altering	the	ACL	caches	and	tables	
37	
Feature Request
from DBAs
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
New!		Dynamic	Privileges	
Provides	finer	grained	administrative	level	access	controls	
•  Too	often	super	is	required		for	tasks	when	less	privilege	is	really	needed	
•  Needed	to	allow	adding	administrative	access	controls		
•  SUPER	privilege	split	into	a	set	of	dynamic	privileges,	e.g.	
–  SYSTEM_VARIABLES_ADMIN	
–  ROLE_ADMIN	
–  CONNECTION_ADMIN,	etc.	
•  Each	plugin	can	now	register	and	use	their	own	unique	privileges	
•  All	existing	MySQL	plugins	currently	using	SUPER	are	updated	to	add	
specific	privileges,	e.g.	
38
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
39	
Enterprise	
Security	Architecture	 ¡ ¡ Workbench
• Model
• Data
• Audit Data
• User Management
¡ ¡ Enterprise Monitor
• Identifies Vulnerabilities
• Security hardening policies
• User Monitoring
• Password Monitoring
• Schema Change Monitoring
• Backup Monitoring
¡ Enterprise Encryption
• TDE
• Encryption
• PKI
¡ ¡ Firewall
¡ Key Vault
¡ Enterprise Authentication
• SSO - LDAP, AD, PAM
¡ Network Encryption
¡ Enterprise Audit
• Powerful Rules Engine
¡ Audit Vault
¡ Strong Authentication
¡ Access Controls
¡ Assess
¡ Prevent
¡ Detect
¡ Recover
¡  Enterprise Backup
¡ HA
• Innodb Cluster
¡ Thread Pool
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Security	Direction	
Continuing	to	focus	in	areas	such	as	
•  TDE	/	Encryption	/	Key	Management	
•  Masking	
•  Audit	
•  Firewall	
•  Authentication	
•  Integration	to	various	Oracle	Cloud	Services	
Confidential	–	Oracle	Internal/Restricted/Highly	Restricted	 40	
Customer	feedback	and	
requirements	drive	our	
priorities	
	
Tell	us	what	you	want,	
need,	etc.	
	
Give	us	problematic		
use	cases
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
Security	Resources	
•  http://mysqlserverteam.com/	
•  http://insidemysql.com/	
•  https://blogs.oracle.com/mysql	
•  https://www.mysql.com/why-mysql/#en-0-40	
•  https://www.mysql.com/why-mysql/presentations/#en-17-40	
•  https://www.mysql.com/news-and-events/on-demand-webinars/
#en-20-40	
•  https://www.mysql.com/news-and-events/health-check/	
41
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	
References	
•  MySQL	Enterprise	Security		
•  MySQL	Enterprise	Authentication	
•  MySQL	Enterprise	Firewall	
•  MySQL	Enterprise	Transparent	Data	Encryption	
•  MySQL	Enterprise	Audit	
•  MySQL	Enterprise	Backup	
•  MySQL	Enteprise	Monitor	
•  Encryption	Functions	
•  Enterprise	Encryption	Functions	
	
Confidential	–	Oracle	Internal	 42
Copyright	©	2014	Oracle	and/or	its	affiliates.	All	rights	reserved.		|	 43
TLV - MySQL Security overview

More Related Content

What's hot

Why MySQL High Availability Matters
Why MySQL High Availability MattersWhy MySQL High Availability Matters
Why MySQL High Availability MattersMark Swarbrick
 
No sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQLNo sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQLMark Swarbrick
 
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin2016 MySQL State of the Dolphin
2016 MySQL State of the DolphinMark Swarbrick
 
MySQL Enterprise Edition
MySQL Enterprise EditionMySQL Enterprise Edition
MySQL Enterprise EditionMark Swarbrick
 
MySQL Security Best Practises
MySQL Security Best PractisesMySQL Security Best Practises
MySQL Security Best PractisesMark Swarbrick
 
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clustersPercona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clustersMark Swarbrick
 
MySQL as a Document Store
MySQL as a Document StoreMySQL as a Document Store
MySQL as a Document StoreMark Swarbrick
 
Developing MySQL applications in the Cloud
Developing MySQL applications in the CloudDeveloping MySQL applications in the Cloud
Developing MySQL applications in the CloudMark Swarbrick
 
Oracle MySQL Cloud Service
Oracle MySQL Cloud ServiceOracle MySQL Cloud Service
Oracle MySQL Cloud ServiceMark Swarbrick
 
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1Mark Swarbrick
 
MySQL Enterprise Cloud
MySQL Enterprise Cloud MySQL Enterprise Cloud
MySQL Enterprise Cloud Mark Swarbrick
 
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMark Swarbrick
 
MySQL London Tech Tour March 2015 - Big Data
MySQL London Tech Tour March 2015 - Big DataMySQL London Tech Tour March 2015 - Big Data
MySQL London Tech Tour March 2015 - Big DataMark Swarbrick
 
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!Miguel Araújo
 
Application Development with Oracle Database
Application Development with Oracle DatabaseApplication Development with Oracle Database
Application Development with Oracle Databasegvenzl
 
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...tdc-globalcode
 
Valor diferencial de la propuesta cloud
Valor diferencial de la propuesta cloudValor diferencial de la propuesta cloud
Valor diferencial de la propuesta cloudOracleIberia
 
Nuevas oportunidades de negocio en turismo
Nuevas oportunidades de negocio en turismo Nuevas oportunidades de negocio en turismo
Nuevas oportunidades de negocio en turismo OracleIberia
 
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooWhy Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooAmazon Web Services
 
AUSOUG Analytics Update - Nov 14 2018
AUSOUG Analytics Update - Nov 14 2018AUSOUG Analytics Update - Nov 14 2018
AUSOUG Analytics Update - Nov 14 2018Jason Lowe
 

What's hot (20)

Why MySQL High Availability Matters
Why MySQL High Availability MattersWhy MySQL High Availability Matters
Why MySQL High Availability Matters
 
No sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQLNo sql from the web’s favourite relational database MySQL
No sql from the web’s favourite relational database MySQL
 
2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin2016 MySQL State of the Dolphin
2016 MySQL State of the Dolphin
 
MySQL Enterprise Edition
MySQL Enterprise EditionMySQL Enterprise Edition
MySQL Enterprise Edition
 
MySQL Security Best Practises
MySQL Security Best PractisesMySQL Security Best Practises
MySQL Security Best Practises
 
Percona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clustersPercona Live - Dublin 01 my sql ha-mysql-clusters
Percona Live - Dublin 01 my sql ha-mysql-clusters
 
MySQL as a Document Store
MySQL as a Document StoreMySQL as a Document Store
MySQL as a Document Store
 
Developing MySQL applications in the Cloud
Developing MySQL applications in the CloudDeveloping MySQL applications in the Cloud
Developing MySQL applications in the Cloud
 
Oracle MySQL Cloud Service
Oracle MySQL Cloud ServiceOracle MySQL Cloud Service
Oracle MySQL Cloud Service
 
Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1Oow MySQL Whats new in security overview sept 2017 v1
Oow MySQL Whats new in security overview sept 2017 v1
 
MySQL Enterprise Cloud
MySQL Enterprise Cloud MySQL Enterprise Cloud
MySQL Enterprise Cloud
 
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL DaysMySQL InnoDB + NDB Cluster - 2018 MySQL Days
MySQL InnoDB + NDB Cluster - 2018 MySQL Days
 
MySQL London Tech Tour March 2015 - Big Data
MySQL London Tech Tour March 2015 - Big DataMySQL London Tech Tour March 2015 - Big Data
MySQL London Tech Tour March 2015 - Big Data
 
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
FOSDEM'18: MySQL InnoDB Cluster - MySQL HA Made Easy!
 
Application Development with Oracle Database
Application Development with Oracle DatabaseApplication Development with Oracle Database
Application Development with Oracle Database
 
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
TDC2018SP | Trilha NoSQL - Tecnicas avancadas utilizadas por redes sociais qu...
 
Valor diferencial de la propuesta cloud
Valor diferencial de la propuesta cloudValor diferencial de la propuesta cloud
Valor diferencial de la propuesta cloud
 
Nuevas oportunidades de negocio en turismo
Nuevas oportunidades de negocio en turismo Nuevas oportunidades de negocio en turismo
Nuevas oportunidades de negocio en turismo
 
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooWhy Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should Too
 
AUSOUG Analytics Update - Nov 14 2018
AUSOUG Analytics Update - Nov 14 2018AUSOUG Analytics Update - Nov 14 2018
AUSOUG Analytics Update - Nov 14 2018
 

Similar to TLV - MySQL Security overview

The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraLuca Martelli
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudDr. Wilfred Lin (Ph.D.)
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationDomenico Catalano
 
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMChicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMAlithya
 
Cómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PMCómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PMOracleOfficeOfFinance
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group ReplicationMark Swarbrick
 
Data Management in a Microservices World
Data Management in a Microservices WorldData Management in a Microservices World
Data Management in a Microservices Worldgvenzl
 
Next Generation Data Center Strategies
Next Generation Data Center StrategiesNext Generation Data Center Strategies
Next Generation Data Center StrategiesVenkat Nambiyur
 
#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General Session#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General SessionDane Roberts
 
Fast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland MeetupFast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland MeetupC. Scyphers
 
Agile Development and DevOps in the Oracle Cloud
Agile Development and DevOps in the Oracle CloudAgile Development and DevOps in the Oracle Cloud
Agile Development and DevOps in the Oracle Cloudjeckels
 
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...Sandesh Rao
 
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...Sandesh Rao
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Nadine Schoene
 
(Oracle) DBA Skills to Have, to Obtain and to Nurture
(Oracle) DBA Skills to Have, to Obtain and to Nurture(Oracle) DBA Skills to Have, to Obtain and to Nurture
(Oracle) DBA Skills to Have, to Obtain and to NurtureMarkus Michalewicz
 
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesArtur Alves
 
Social sourcing ppt
Social sourcing pptSocial sourcing ppt
Social sourcing pptkrittenlee
 

Similar to TLV - MySQL Security overview (20)

The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
Chicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFMChicago EPM Day-Excellence in Consolidations with HFM
Chicago EPM Day-Excellence in Consolidations with HFM
 
Cómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PMCómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PM
 
MySQL Group Replication
MySQL Group ReplicationMySQL Group Replication
MySQL Group Replication
 
Data Management in a Microservices World
Data Management in a Microservices WorldData Management in a Microservices World
Data Management in a Microservices World
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Next Generation Data Center Strategies
Next Generation Data Center StrategiesNext Generation Data Center Strategies
Next Generation Data Center Strategies
 
Apouc 2014-learn-from-oracle-support
Apouc 2014-learn-from-oracle-supportApouc 2014-learn-from-oracle-support
Apouc 2014-learn-from-oracle-support
 
#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General Session#OOW16 - Risk Management Cloud / GRC General Session
#OOW16 - Risk Management Cloud / GRC General Session
 
Fast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland MeetupFast Data Overview for Data Science Maryland Meetup
Fast Data Overview for Data Science Maryland Meetup
 
Agile Development and DevOps in the Oracle Cloud
Agile Development and DevOps in the Oracle CloudAgile Development and DevOps in the Oracle Cloud
Agile Development and DevOps in the Oracle Cloud
 
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
NZOUG - GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Pres...
 
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
AIOUG-GroundBreakers-2018 -Using Oracle Autonomous Health Framework to Preser...
 
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
 
(Oracle) DBA Skills to Have, to Obtain and to Nurture
(Oracle) DBA Skills to Have, to Obtain and to Nurture(Oracle) DBA Skills to Have, to Obtain and to Nurture
(Oracle) DBA Skills to Have, to Obtain and to Nurture
 
Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
 
MySQL Clusters
MySQL ClustersMySQL Clusters
MySQL Clusters
 
Social sourcing ppt
Social sourcing pptSocial sourcing ppt
Social sourcing ppt
 

More from Mark Swarbrick

MySQL NoSQL Document Store
MySQL NoSQL Document StoreMySQL NoSQL Document Store
MySQL NoSQL Document StoreMark Swarbrick
 
MySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMark Swarbrick
 
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8Mark Swarbrick
 
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMark Swarbrick
 
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreOracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreMark Swarbrick
 
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMark Swarbrick
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMark Swarbrick
 
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMark Swarbrick
 
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMark Swarbrick
 
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMark Swarbrick
 
MySQL Cluster Whats New
MySQL Cluster Whats NewMySQL Cluster Whats New
MySQL Cluster Whats NewMark Swarbrick
 
MySQL Enterprise Cloud
MySQL Enterprise CloudMySQL Enterprise Cloud
MySQL Enterprise CloudMark Swarbrick
 

More from Mark Swarbrick (16)

MySQL NoSQL Document Store
MySQL NoSQL Document StoreMySQL NoSQL Document Store
MySQL NoSQL Document Store
 
MySQL @ the University Of Nottingham
MySQL @ the University Of NottinghamMySQL @ the University Of Nottingham
MySQL @ the University Of Nottingham
 
InnoDb Vs NDB Cluster
InnoDb Vs NDB ClusterInnoDb Vs NDB Cluster
InnoDb Vs NDB Cluster
 
MySQL Security & GDPR
MySQL Security & GDPRMySQL Security & GDPR
MySQL Security & GDPR
 
Intro To MySQL 2019
Intro To MySQL 2019Intro To MySQL 2019
Intro To MySQL 2019
 
MySQL 8
MySQL 8MySQL 8
MySQL 8
 
MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8MySQL Dublin Event Nov 2018 - MySQL 8
MySQL Dublin Event Nov 2018 - MySQL 8
 
MySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the DolphinMySQL Dublin Event Nov 2018 - State of the Dolphin
MySQL Dublin Event Nov 2018 - State of the Dolphin
 
Oracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document StoreOracle Code Event - MySQL JSON Document Store
Oracle Code Event - MySQL JSON Document Store
 
MySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL DaysMySQL At University Of Nottingham - 2018 MySQL Days
MySQL At University Of Nottingham - 2018 MySQL Days
 
MySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL DaysMySQL At Mastercard - 2018 MySQL Days
MySQL At Mastercard - 2018 MySQL Days
 
MySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL DaysMySQL 8 - 2018 MySQL Days
MySQL 8 - 2018 MySQL Days
 
MySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL DaysMySQL Cloud - 2018 MySQL Days
MySQL Cloud - 2018 MySQL Days
 
MySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL DaysMySQL 2018 Intro - 2018 MySQL Days
MySQL 2018 Intro - 2018 MySQL Days
 
MySQL Cluster Whats New
MySQL Cluster Whats NewMySQL Cluster Whats New
MySQL Cluster Whats New
 
MySQL Enterprise Cloud
MySQL Enterprise CloudMySQL Enterprise Cloud
MySQL Enterprise Cloud
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

TLV - MySQL Security overview