My Account Log in

1 option

How to secure and audit Oracle 10g and 11g / Ron Ben Natan ; foreword by Pete Finnigan.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Ben-Natan, Ron.
Series:
Auerbach book.
An Auerbach book
Language:
English
Subjects (All):
Oracle (Computer file).
Computer security.
Data protection.
Database security.
Physical Description:
1 online resource (472 p.)
Edition:
1st edition
Place of Publication:
Boca Raton : CRC Press, c2009.
Language Note:
English
System Details:
text file
Summary:
Oracle is the number one database engine in use today. The fact that it is the choice of military organizations and agencies around the world is part of the company's legacy and is evident in the product. Oracle has more security-related functions, products, and tools than almost any other database engine. Unfortunately, the fact that these capabilities exist does not mean that they are used correctly or even used at all. In fact, most users are familiar with less than twenty percent of the security mechanisms within Oracle. Written by Ron Ben Natan, one of the most respected and knowledgeable
Contents:
Front cover; Dedication; Contents; Foreword; Acknowledgments; Author; Chapter 1. Introduction: How This Book Will Help You Be Secure and Compliant; Chapter 2. Hardening the Database; Chapter 3. Securing the Listener; Chapter 4. Account Security; Chapter 5. Cryptography, Oracle Wallets, and Oracle PKI; Chapter 6. Authentication; Chapter 7. Encrypting Data-in-Transit; Chapter 8. Encrypting Data-at-Rest; Chapter 9. Standard Auditing; Chapter 10. Mandatory and Administrator Auditing; Chapter 11. Fine-Grained Auditing; Chapter 12. Auditing Before/After Values and Monitoring Selected Data
Chapter 13. Oracle Audit VaultChapter 14. Database Activity Monitoring; Chapter 15. Privileges and Authorization; Chapter 16. Virtual Private Database; Chapter 17. Oracle Database Vault; Appendix A: Payment Card Industry (PCI) Data Security Standard (DSS) Version 1.1: Impact on Oracle Security Implementations; Appendix B: Using an ""All-in-One"" Solution: An Example; Index; Back cover
Notes:
"An Auerbach book."
Includes index.
ISBN:
9786612025013
9781040067819
1040067816
9780429132568
0429132565
9781282025011
1282025015
9781420084139
1420084135
OCLC:
320369277

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account