Book description
Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. “In my experience in the security world, including 32 years at the Central Intelligence Agency, I’ve not found anyone with more experience in the theory and practice of protecting your data than David Knox.” --Dave Carey, former Executive Director of the CIA
Table of contents
- Cover Page
- Effective Oracle Database 10g Security by Design
- Copyright Page
- Contents
- Foreword
- Acknowledgments
- Introduction
-
PART I Quick Start
- 1 General Security Best Practices
- 2 Securing the Database
-
PART II Identification and Authentication
- 3 Understanding Identification and Authentication
- 4 Connection Pools and Proxy Authentication
- 5 Identity Management and Enterprise Users
- 6 Identification and Authentication for Web Applications
-
PART III Authorizations and Auditing
- 7 Privileges and Roles
- 8 Effective Auditing for Accountability
-
PART IV Fine-Grained Access Control
- 9 Application Contexts for Security and Performance
- 10 Implementing Fine-Grained Access Controls with Views
- 11 Row-Level Security with Virtual Private Database
- 12 Oracle Label Security
- 13 Database Encryption
- PART V Appendixes
- Index
Product information
- Title: Effective Oracle Database 10g Security by Design
- Author(s):
- Release date: July 2004
- Publisher(s): McGraw Hill Computing
- ISBN: 9780071770460
You might also like
book
Pro Oracle Spatial for Oracle Database 11g
Pro Oracle Spatial for Oracle Database 11g shows how to take advantage of Oracle Database's built-in …
book
Oracle Net8 Configuration and Troubleshooting
Net8 is the fundamental Oracle technology that allows Oracle services and clients to communicate with each …
book
Oracle 10g Developing Media Rich Applications
Oracle 10g Developing Media Rich Applications is focused squarely on database administrators and programmers as the …
book
Oracle Data Guard 11g Handbook
Master Oracle Data Guard 11 g Provide superior data protection, availability, and disaster recovery using the …