Oracle Security covers the field of Oracle security from simple to complex. It describes basic RDBMS security features (e.g., passwords, profiles, roles, privileges, synonyms) and discusses such Oracle products as the Oracle Enterprise Server and Oracle Security Server. The book also touches on advanced security features, such as encryption, Trusted Oracle, and Internet and Web protection.
Oracle Security focuses on the following database security topics:
- Establishing an organization's security policy and plan
- Protecting system files and passwords
- Controlling access to database objects (tables, views, rows, columns, etc.)
- Building appropriate user profiles, roles, and privileges
- Monitoring system access via audit trails
- Developing appropriate backup and recovery strategies
About the Authors
Marlene Theriault has over 14 years of experience as a database administrator, starting with version 2.0 of the Oracle RDBMS. She has presented papers at numerous conferences throughout the world, including various IOUG-A, DECUS, EOUG, and Oracle OpenWorld conferences. At the 1997 East Coast Oracle conference, Marlene tied for first place with Steven Feuerstein, receiving an "Outstanding Speaker" award. She also received the "Distinguished Speaker" award two years in a row at ECO- '95 and ECO- '96. Marlene's articles have appeared in Pinnacle Press' Oracle Developer Magazine, IOUG-A's SELECT Magazine, and many user group publications. Marlene reactivated the Mid-Atlantic Association of Oracle Professionals' Database Administration Special Interest Group and is the current chair of the MAOP DBA SIG. She authors an "Ask The DBA" column for the MAOP newsletter, and her articles and columns are available at http://www.maop.org/sig-dba/.
William Heney started working with version 2 of the Oracle database in 1980. After doing application development in FORTRAN and what then passed for "Forms," he began to specialize in DBA work. In the ensuing years he has worked for a wide variety of customers, many of whom wanted some form of access control implemented in the database. Some of the techniques acquired during these experiences are reflected in this book.
By Marlene Theriault & William Heney
1st Edition October 1998
446 pages, ISBN: 1-56592-450-9; $34.95
For over 40 years, O’Reilly has provided technology and business training, knowledge, and insight to help companies succeed. Our unique network of experts and innovators share their knowledge and expertise through the company’s SaaS-based training and learning platform. O’Reilly delivers highly topical and comprehensive technology and business learning solutions to millions of users across enterprise, consumer, and university channels. For more information, visit www.oreilly.com.