This text teaches readers the why and how of implementing security plans in an Oracle environment. It proceeds logically through the necessary steps, which include: understanding Oracle's security architecture and implementing a plan; securing and interacting with OS's - Windows NT/2000, UNIX, and Linux; securing the database - with concrete examples; securing the network - with coverage of Web site and Oracle Portal security; and protecting against hackers, auditing and troubleshooting. Supplemental information including a glossary of terms, security risk assessment review, a hands-on tutorial to securing a server, and new security features for Oracle9i is also included.