Security in Data Warehousing
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
20-10-2010, 11:17 AM

Presented by:
Janani. S

.ppt   Security in Data Warehousing.ppt (Size: 334 KB / Downloads: 118)

Data warehouse – an integrated repository.
Process involved- read, clean, aggregate and store.
Varied number of applications
Tools to access the warehouse

Characteristics of DW Data
Data is organized around subjects or business dimensions, such as sales, customers, orders, claims, accounts, employees, etc.
Data is collected from several transactional databases, and integrated in a way to provide a unified picture of each subject over time.
Data from different databases is transformed into a common schema, measurement, code, data type.
Data stored is not transaction-level, but aggregated by products, regions, months/years, or some other business dimension.
Active In SP

Posts: 1
Joined: Apr 2011
11-04-2012, 12:27 AM

janani where are you? missing u so much,,
seminar paper
Active In SP

Posts: 6,455
Joined: Feb 2012
11-04-2012, 09:48 AM

to get information about the topic "Security in Data Warehousing" FULL REPORT PPT AND RELATED TOPIC REFER THE LINK BELLOW

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: data warehouse topics, datawarehouse securiy ppt, security in data warehousing, security in data warehousing ppt, security datawarehousing ppt, data warehousing in computer security ppt, data warehousing,
Popular Searches: data security ppt, data security degausser, logisticsdata warehousing, data warehouse environment, data security in data warehouse ppt, data warehouse, public warehousing,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 145 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,411 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 268 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 268 13-02-2015, 02:01 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 300 29-01-2015, 01:15 PM
Last Post: jaseelati
  cloud data protection for the masses project documentation jaseelati 0 305 21-01-2015, 04:19 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 274 17-01-2015, 04:13 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 393 06-01-2015, 04:47 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 307 30-12-2014, 03:23 PM
Last Post: jaseelati
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks seminar ideas 11 3,911 02-04-2014, 12:50 PM
Last Post: Guest