yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

CyberSecurity Malaysia's Award Winning Firm Host 9th Annual Information Security Symposium

Kuala Lumpur, Nov 20, 2012 - (ACN Newswire) - EC-Council Academy, a leading information security training provider throughout Southeast Asia, is hosting its ninth annual Hacker Halted APAC event today.

"The Hacker Halted APAC series has been a leading and constant source of information for the regional information security community," said Wilson Wong, Managing Director, EC-Council Academy. "The event has been addressing up-to-date and edgy hacker technology and strategies since 2004."

More than 400 regional information security professionals are gathered at the Berjaya Times Square Hotel for this year's event.

The theme for Hacker Halted APAC 2012 is "Unravelling the Enigma of Insecurity", focuses on security issues related to the transition of desktops to mobile devices, cloud computing, and current hacking technologies.

Information security and cyber crimes have remained high on the threat list for organizations, government bodies and consumers. While cyber security awareness has increased, according to Wong, the lack of informed action and strategies has created a large gap open to risks and attacks. A recent survey by Hewlett Packard and the Ponemon Institute shows that there has been a 42% increase of cyber attacks in 2012 compared to 2011.

Cyber crimes have reach a new level of sophistication, according to an ethical hacking whitepaper by Frost & Sullivan.

"There's no doubt that every organization and internet user will be direct or indirect victims of cyber crime and cyber attacks in the near future. Our aim here is to level the playing field so that the good guys will be able to stay ahead of cyber criminals," said Wong.

Wong also stresses on the importance of having an aggressive defence systems and contingency plans to overcome an attack.

Hacker Halted APAC 2012 will feature live hacking and defense sessions throughout the event. A series of technical focused hacker combat workshops featuring latest network penetration techniques, cyber warfare and mobile devices security will also take place during this 4-day event.

Hacker Halted APAC 2012 is endorsed by the Malaysian Ministry of Science, Technology and Innovation (MOSTI) and Multimedia Development Corporation (MDeC).

EC-Council Academy recently won the "Information Security Education & Training Provider of the Year 2012" award by CyberSecurity Malaysia. EC-Council Academy is a training organization that focuses on information security and nothing else.

About EC-Council Academy

EC-Council Academy was established in 2000 and is now recognized as one of the leading providers for global certification programs and services, designed to enable advancement through IT security certifications. Learn more about EC-Council Academy at

Contact information:
Maddy Low
+603 7665 0911

Source: EC-Council Academy

Copyright 2012 ACN Newswire. All rights reserved.

About ACN Newswire
Copyright 2008 ACN Newswire. All rights reserved. Republication or redistribution of ACN Newswire content is expressly prohibited without the prior written consent of ACN Newswire. ACN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers