Cargando…

Oracle database 12c security /

David Knox, the most well-respected and notable Oracle security expert, provides the trusted advice and latest best practices for comprehensive Oracle Database security.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Gaetjen, Scott (Autor), Knox, David (David Christopher) (Autor), Maroulis, William (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn908199970
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150430s2015 nyua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d DEBBG  |d OCLCF  |d DEBSZ  |d TOH  |d RDF  |d LVT  |d S4S  |d OCLCQ  |d EBLCP  |d YDX  |d OCLCO  |d OCLCQ  |d N$T  |d OCLCO 
019 |a 914291845  |a 1076642776  |a 1165388913  |a 1175674678  |a 1381245840 
020 |a 9780071822961  |q (electronic bk.) 
020 |a 0071822968  |q (electronic bk.) 
020 |z 9780071824286 
020 |z 0071824286 
029 1 |a DEBBG  |b BV042683265 
029 1 |a DEBSZ  |b 446584703 
035 |a (OCoLC)908199970  |z (OCoLC)914291845  |z (OCoLC)1076642776  |z (OCoLC)1165388913  |z (OCoLC)1175674678  |z (OCoLC)1381245840 
037 |a CL0500000583  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Gaetjen, Scott,  |e author. 
245 1 0 |a Oracle database 12c security /  |c Scott Gaetjen, David Knox, William Maroulis. 
246 3 0 |a Oracle database twelve c security 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
500 |a Includes index. 
520 8 |a David Knox, the most well-respected and notable Oracle security expert, provides the trusted advice and latest best practices for comprehensive Oracle Database security.  |b Best Practices for Comprehensive Oracle Database SecurityWritten by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in amultitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical and easy-to-understand examples. Connect users to databases in a secure mannerManage identity, authentication, and access controlImplement database application securityProvide security policies across enterprise applications using Real Application SecurityControl data access with OracleVirtual Private DatabaseControl sensitive data using data redaction and transparent sensitive data protectionControl data access with Oracle Label SecurityUse Oracle Database Vault and Transparent Data Encryption for compliance, cybersecurity, and insider threatsImplement auditing technologies, including Unified Audit TrailManage security policies and monitor a secure databaseenvironment with Oracle Enterprise Manager Cloud Control. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- About the Author -- Contents -- Foreword -- Acknowledgments -- Introduction -- Part I: Essential Database Security -- Chapter 1: Security for Today's World -- The Security Landscape -- Base Assumptions -- Database Security Today -- Evolving Security Technologies -- Security Motivators -- Sensitive Data Categorization -- Principles -- Summary -- Chapter 2: Essential Elements of User Security -- Understanding Identification and Authentication -- Identification Methods -- Authentication -- Understanding Database Account Types 
505 8 |a Database Account Types in Oracle Database 12c Multitenant Architecture -- Privileged Database Account Management in Oracle Database 12c -- Administrative Privileges for Separation of Duty -- Methods for Privileged Database Account Management -- Account Management in Multitenant Oracle Database 12c -- Creating Common Database Accounts -- Managing Accounts in a Pluggable Database -- Managing Database Account Passwords and Profiles -- Managing Passwords for Local Database Accounts -- Managing Database Account Profiles -- Summary -- Chapter 3: Connection Pools and Enterprise Users 
505 8 |a External Identification and Authentication Challenges -- Connection Challenges -- Performance -- Connection Pools -- Security Risks -- External Identification and Authentication in Oracle Database 12c -- Oracle Proxy Authentication -- Oracle Enterprise User Security -- Oracle Kerberos Authentication -- Oracle RADIUS Authentication -- Summary -- Chapter 4: Foundational Elements for a Secure Database -- Access Control, Authorization, and Privilege -- Access Control -- Authorization -- Privilege -- Object Privileges -- Column Privileges -- Synonyms -- System and Object Privileges Together 
505 8 |a Privilege Conveyance and Retraction -- Roles -- Role and Privilege Immediacy -- Roles and Container Databases -- Public and Default Database Roles -- Role Hierarchies -- Object Privileges Through Roles and PL/SQL -- Selective Privilege Enablement -- Selective Privilege Use Cases -- Password-Protected Roles -- Password-Protected Role Example -- Password-Protected Roles and Proxy Authentication -- Challenges to Securing the Password -- Secure Application Roles -- Secure Application Role Example -- Global Roles and Enterprise Roles -- Creating and Assigning Global and Enterprise Roles 
505 8 |a Combining Standard and Global Roles -- Using Roles Wisely -- Too Many Roles -- Naming -- Dependencies -- Summary -- Chapter 5: Foundational Elements of Database Application Security -- Application Context -- Default Application Context (USERENV) -- Auditing with USERENV -- Database Session-Based Application Context -- Creating a Database Session-Based Application Context -- Setting Context Attributes and Values -- Applying the Application Context to Security -- Secure Use -- Common Mistakes -- Global Application Context -- GAC Uses -- GAC Example -- Global Context Memory Usage 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Oracle (Computer file) 
630 0 7 |a Oracle (Computer file)  |2 fast 
650 0 |a Database security. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 7 |a Database security  |2 fast 
700 1 |a Knox, David  |q (David Christopher),  |e author. 
700 1 |a Maroulis, William,  |e author. 
776 0 8 |i Print version:  |a Gaetjen, Scott.  |t Oracle database 12c security  |z 9780071824286  |w (DLC) 2014044429  |w (OCoLC)875520327 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071824286/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6258864 
938 |a YBP Library Services  |b YANK  |n 16841014 
938 |a EBSCOhost  |b EBSC  |n 2686793 
994 |a 92  |b IZTAP