9780072231304-0072231300-Effective Oracle Database 10g Security by Design

Effective Oracle Database 10g Security by Design

ISBN-13: 9780072231304
ISBN-10: 0072231300
Edition: First Edition
Author: McGraw Hill, David Knox
Publication date: 2004
Publisher: McGraw Hill
Format: Paperback 560 pages
FREE US shipping on ALL non-marketplace orders
Marketplace
from $3.51 USD
Buy

From $3.51

Book details

ISBN-13: 9780072231304
ISBN-10: 0072231300
Edition: First Edition
Author: McGraw Hill, David Knox
Publication date: 2004
Publisher: McGraw Hill
Format: Paperback 560 pages

Summary

Effective Oracle Database 10g Security by Design (ISBN-13: 9780072231304 and ISBN-10: 0072231300), written by authors McGraw Hill, David Knox, was published by McGraw Hill in 2004. With an overall rating of 4.0 stars, it's a notable title among other books. You can easily purchase or rent Effective Oracle Database 10g Security by Design (Paperback) from BooksRun, along with many other new and used books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.58.

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider

Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Designprovides all the information you need to develop and deploy secure database applications. The entire security cycle is covered--from identification and authentication to fine-grained access control and encryption to effective auditing techniques. The material is presented with comprehensive yet easy-to-understand examples that show how to use all the security technologies in a complementary way.

  • Assess database vulnerabilities and develop effective security policies
  • Preserve user identity with in-depth analyses of JDBC connection pools, proxy authentication, and client identifiers
  • Manage database users from a central directory without sacrificing security
  • Lock down database access using secure application roles
  • Leverage application and database security within Oracle’s Identity Management infrastructure
  • Validate user privileges by using simple views and scripts
  • Protect individual data elements by using the new Oracle DBMS_CRYPTO package
  • Exploit database views to provide row-level and column-level fine-grained access controls
  • Enforce need-to-know access and data privacy with Virtual Private Database and Oracle Label Security
  • Ensure user accountability with Oracle fine-grained Auditing




Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book