with Tags: obfuscation X
Legitimate Security Through Obscurity Community Blog
There are times when “security through obscurity” is a perfectly legitimate security control tactic, especially against opportunistic attackers. [Read this post.]
from Blog: Security and Risk Management
Do you write SQL or SQL PL code that you want to provide to others? For example you are a vendor who sells code to customers, or perhaps you want to provide share-ware libraries of DB2 extensions, but that doesn't mean you want to provide open source code?...
from Blog: SQL Tips for DB2 LUW