Oracle Press
2 total works
Applied Oracle Security: Developing Secure Database and Middleware Environments
by David Knox, Scott Gaetjen, Hamza Jahangir, Tyler Muth, Patrick Sack, Richard Wark, and Bryan Wise
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Cutting-edge techniques from leading Oracle security experts
This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications.
Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today's IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider
Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Designprovides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.
- Assess database vulnerabilities and develop effective security policies
- Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers
- Manage database users from a central directory without sacrificing security
- Lock down database access using secure application roles
- Leverage application and database security within Oracle’s Identity Management infrastructure
- Validate user privileges by using simple views and scripts
- Protect individual data elements by using the new Oracle DBMS_CRYPTO package
- Exploit database views to provide row-level and column-level fine-grained access controls
- Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security
- Ensure user accountability with Oracle fine-grained Auditing